Monday, March 19, 2018

Tor Browser 8.0a4 is released

Tor Browser 8.0a4 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

The full changelog since Tor Browser 8.0a3 is:

  • All platforms
    • Update Firefox to 52.7.2esr

原文:https://blog.torproject.org/tor-browser-80a4-released

Advertisements


via 细节的力量 http://ift.tt/2G1YcUn

Tor Browser 7.5.2 is released

Tor Browser 7.5.2 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

Note: Users of the Tor Browser alpha series are strongly encouraged to use the stable series while we are preparing a new alpha release.

The full changelog since Tor Browser 7.5.1 is:

  • All platforms
    • Update Firefox to 52.7.2esr

原文:https://blog.torproject.org/tor-browser-752-released

Advertisements


via 细节的力量 http://ift.tt/2HKq24u

Tor Browser 7.5.2 is released

Tor Browser 7.5.2 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

Note: Users of the Tor Browser alpha series are strongly encouraged to use the stable series while we are preparing a new alpha release.

The full changelog since Tor Browser 7.5.1 is:

  • All platforms
    • Update Firefox to 52.7.2esr

原文:https://blog.torproject.org/tor-browser-752-released

Advertisements


via 细节的力量 http://ift.tt/2G3Bprk

Friday, March 16, 2018

Shadowsocks视窗版客户端(v4.0.9)

Assets

 

  • Fix port occupied issue
  • Add xchacha20-ietf-poly1305
  • Update cryptographic libraries
  • Bug fixes and improvemen

原文:https://github.com/shadowsocks/shadowsocks-windows/releases/tag/4.0.9



via 细节的力量 http://ift.tt/2DwDUgo

Shadowsocks安卓版客户端(v4.5.1)

Assets

Minor bug fixes.

原文:https://github.com/shadowsocks/shadowsocks-android/releases/tag/v4.5.1



via 细节的力量 http://ift.tt/2G2zTWf

Tor Browser 8.0a3 is released

Tor Browser 8.0a3 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

In addition to security updates to Firefox (52.7.0esr) this release includes newer versions of Tor (0.3.3.3), HTTPS Everywhere (2018.2.26), and obfs4proxy (0.0.7).

Apart from those component updates we are proud that this alpha is the first one containing Moat, which is a more robust way of getting bridges from torproject.org using the meek pluggable transport. Please try it out if you can and report any issues you find!

The full changelog since Tor Browser 8.0a2 is:

  • All platforms
    • Update Firefox to 52.7.0esr
    • Update Tor to 0.3.3.3-alpha
    • Update Tor Launcher to 0.2.15.1
      • Bug 23136: Moat integration (fetch bridges for the user)
      • Translations update
    • Update HTTPS Everywhere to 2018.2.26
      • Bug 25339: Adapt build system for Python 3.6 based build procedure
    • Bug 25356: Update obfs4proxy to v0.0.7
    • Bug 25147: Sanitize HTML fragments created for chrome-privileged documents
  • Windows
    • Bug 25112: No sandboxing on 64-bit Windows <= Vista

原文:https://blog.torproject.org/tor-browser-80a3-released



via 细节的力量 http://ift.tt/2tTtVSO

Tor Browser 7.5.1 is released

Tor Browser 7.5.1 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

In addition to security updates to Firefox (52.7.0esr) this release includes newer versions of Tor (0.3.2.10), NoScript (5.1.8.4), and obfs4proxy (0.0.7).

Moreover, we fixed sandbox incompatibilities for 64bit Windows Vista users and amended the NoScript whitelist, which unbreaks extension panels on higher security levels.

Note: We did not include the latest HTTPS Everywhere release in Tor Browser 7.5.1 as we need to first test some changes in its new build system in an alpha release to make sure we still can build everything reproducibly. We expect to have this fixed in the next stable release, though. Sorry for any inconvenience.

The full changelog since Tor Browser 7.5 is:

  • All platforms
    • Update Firefox to 52.7.0esr
    • Update Tor to 0.3.2.10
    • Update Torbutton to 1.9.8.6
      • Bug 24159: Version check does not deal with platform specific checks
      • Bug 25016: Remove 2017 donation banner
      • Translations update
    • Update Tor Launcher to 0.2.14.4
      • Bug 25089: Special characters are not escaped in proxy password
      • Translations update
    • Update NoScript to 5.1.8.4
    • Bug 25356: Update obfs4proxy to v0.0.7
    • Bug 25000: Add [System+Principal] to the NoScript whitelist
  • Windows
    • Bug 25112: Disable sandboxing on 64-bit Windows <= Vista

原文:https://blog.torproject.org/tor-browser-751-released



via 细节的力量 http://ift.tt/2FVyocz

New Tor alpha release: 0.3.3.3-alpha

Hi!  In addition to today’s stable releases, there’s a new alpha release available for download.  If you build Tor from source, you can download the source code for 0.3.3.3-alpha from the usual place on the website.  Packages for relays should be available over the coming days.

Remember, this is an alpha release: you should only run this if you’d like to find and report more bugs than usual.

See the other announcement for more information about today’s security issues.

Tor 0.3.3.3-alpha is the third alpha release for the 0.3.3.x series. It includes an important security fix for a remote crash attack against directory authorities tracked as TROVE-2018-001.

Additionally, with this release, we are upgrading the severity of a bug fixed in 0.3.3.2-alpha. Bug 24700, which was fixed in 0.3.3.2-alpha, can be remotely triggered in order to crash relays with a use-after-free pattern. As such, we are now tracking that bug as TROVE-2018-002 and CVE-2018-0491. This bug affected versions 0.3.2.1-alpha through 0.3.2.9, as well as 0.3.3.1-alpha.

This release also fixes several minor bugs and annoyances from earlier releases.

Relays running 0.3.2.x should upgrade to one of the versions released today, for the fix to TROVE-2018-002. Directory authorities should also upgrade. (Relays on earlier versions might want to update too for the DoS mitigations.)

Changes In Version 0.3.3.3-Alpha – 2018-03-03

  • Major bugfixes (denial-of-service, directory authority):
    • Fix a protocol-list handling bug that could be used to remotely crash directory authorities with a null-pointer exception. Fixes bug 25074; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001 and CVE-2018-0490.
  • Minor features (compatibility, OpenSSL):
    • Tor will now support TLS1.3 once OpenSSL 1.1.1 is released. Previous versions of Tor would not have worked with OpenSSL 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the ciphersuites it requires. Now we enable the TLS 1.3 ciphersuites. Closes ticket 24978.
  • Minor features (logging):
    • Clarify the log messages produced when getrandom() or a related entropy-generation mechanism gives an error. Closes ticket 25120.
  • Minor features (testing):
    • Add a “make test-rust” target to run the rust tests only. Closes ticket 25071.
  • Minor bugfixes (denial-of-service):
    • Fix a possible crash on malformed consensus. If a consensus had contained an unparseable protocol line, it could have made clients and relays crash with a null-pointer exception. To exploit this issue, however, an attacker would need to be able to subvert the directory authority system. Fixes bug 25251; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-004.
  • Minor bugfixes (DoS mitigation):
    • Add extra safety checks when refilling the circuit creation bucket to ensure we never set a value above the allowed maximum burst. Fixes bug 25202; bugfix on 0.3.3.2-alpha.
    • When a new consensus arrives, don’t update our DoS-mitigation parameters if we aren’t a public relay. Fixes bug 25223; bugfix on 0.3.3.2-alpha.
  • Minor bugfixes (man page, SocksPort):
    • Remove dead code from the old “SocksSocket” option, and rename SocksSocketsGroupWritable to UnixSocksGroupWritable. The old option still works, but is deprecated. Fixes bug 24343; bugfix on 0.2.6.3.
  • Minor bugfixes (performance):
    • Reduce the number of circuits that will be opened at once during the circuit build timeout phase. This is done by increasing the idle timeout to 3 minutes, and lowering the maximum number of concurrent learning circuits to 10. Fixes bug 24769; bugfix on 0.3.1.1-alpha.
  • Minor bugfixes (spec conformance):
    • Forbid “-0” as a protocol version. Fixes part of bug 25249; bugfix on 0.2.9.4-alpha.
    • Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249; bugfix on 0.2.9.4-alpha.
  • Minor bugfixes (spec conformance, rust):
    • Resolve a denial-of-service issue caused by an infinite loop in the rust protover code. Fixes bug 25250, bugfix on 0.3.3.1-alpha. Also tracked as TROVE-2018-003.
  • Code simplification and refactoring:
    • Update the “rust dependencies” submodule to be a project-level repository, rather than a user repository. Closes ticket 25323.

原文:https://blog.torproject.org/new-tor-alpha-release-0333-alpha



via 细节的力量 http://ift.tt/2DwDQgE

New stable Tor releases, with security fixes and DoS prevention: 0.3.2.10, 0.3.1.10, 0.2.9.15

Today, we made several new stable Tor releases.  Together, they fix an issue in directory authorities, and backport a feature to improve relays’ resistance of denial-of-service attacks. In addition, the 0.3.2.10 release fixes a security bug affecting relays running earlier 0.3.2.x versions.

To summarize:

  • Relays (and bridges) running 0.3.2.1-alpha through 0.3.2.9 should upgrade.
  • Directory authorities should upgrade.
  • Relays (and bridges) running 0.3.3.1-alpha should upgrade.
  • All other relays (and bridges) may wish to upgrade in order to improve their
    resistance to denial-of-service attacks.

If you build Tor from source, you can fetch the latest source code from https://dist.torproject.org/. New packages for relays should be available in the coming days.

The 0.3.2.10 changelog is below. For the changes in 0.2.9.15 and 0.3.1.10, please see the ChangeLog file distributed along with the source code. The changes in 0.3.3.3-alpha will be listed in my next blog post.


Tor 0.3.2.10 is the second stable release in the 0.3.2 series. It backports a number of bugfixes, including important fixes for security issues.

It includes an important security fix for a remote crash attack against directory authorities, tracked as TROVE-2018-001.

Additionally, it backports a fix for a bug whose severity we have upgraded: Bug 24700, which was fixed in 0.3.3.2-alpha, can be remotely triggered in order to crash relays with a use-after-free pattern. As such, we are now tracking that bug as TROVE-2018-002 and CVE-2018-0491, and backporting it to earlier releases. This bug affected versions 0.3.2.1-alpha through 0.3.2.9, as well as version 0.3.3.1-alpha.

This release also backports our new system for improved resistance to denial-of-service attacks against relays.

This release also fixes several minor bugs and annoyances from earlier releases.

Relays running 0.3.2.x SHOULD upgrade to one of the versions released today, for the fix to TROVE-2018-002. Directory authorities should also upgrade. (Relays on earlier versions might want to update too for the DoS mitigations.)

Changes In Version 0.3.2.10 – 2018-03-03

  • Major bugfixes (denial-of-service, directory authority, backport from 0.3.3.3-alpha):
    • Fix a protocol-list handling bug that could be used to remotely crash directory authorities with a null-pointer exception. Fixes bug 25074; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001 and CVE-2018-0490.
  • Major bugfixes (scheduler, KIST, denial-of-service, backport from 0.3.3.2-alpha):
    • Avoid adding the same channel twice in the KIST scheduler pending list, which could lead to remote denial-of-service use-after-free attacks against relays. Fixes bug 24700; bugfix on 0.3.2.1-alpha.
  • Major features (denial-of-service mitigation, backport from 0.3.3.2-alpha):
    • Give relays some defenses against the recent network overload. We start with three defenses (default parameters in parentheses). First: if a single client address makes too many concurrent connections (>100), hang up on further connections. Second: if a single client address makes circuits too quickly (more than 3 per second, with an allowed burst of 90) while also having too many connections open (3), refuse new create cells for the next while (1-2 hours). Third: if a client asks to establish a rendezvous point to you directly, ignore the request. These defenses can be manually controlled by new torrc options, but relays will also take guidance from consensus parameters, so there’s no need to configure anything manually. Implements ticket 24902.
  • Major bugfixes (onion services, retry behavior, backport from 0.3.3.1-alpha):
    • Fix an “off by 2” error in counting rendezvous failures on the onion service side. While we thought we would stop the rendezvous attempt after one failed circuit, we were actually making three circuit attempts before giving up. Now switch to a default of 2, and allow the consensus parameter “hs_service_max_rdv_failures” to override. Fixes bug 24895; bugfix on 0.0.6.
    • New-style (v3) onion services now obey the “max rendezvous circuit attempts” logic. Previously they would make as many rendezvous circuit attempts as they could fit in the MAX_REND_TIMEOUT second window before giving up. Fixes bug 24894; bugfix on 0.3.2.1-alpha.
  • Major bugfixes (protocol versions, backport from 0.3.3.2-alpha):
    • Add Link protocol version 5 to the supported protocols list. Fixes bug 25070; bugfix on 0.3.1.1-alpha.
  • Major bugfixes (relay, backport from 0.3.3.1-alpha):
    • Fix a set of false positives where relays would consider connections to other relays as being client-only connections (and thus e.g. deserving different link padding schemes) if those relays fell out of the consensus briefly. Now we look only at the initial handshake and whether the connection authenticated as a relay. Fixes bug 24898; bugfix on 0.3.1.1-alpha.
  • Major bugfixes (scheduler, consensus, backport from 0.3.3.2-alpha):
    • The scheduler subsystem was failing to promptly notice changes in consensus parameters, making it harder to switch schedulers network-wide. Fixes bug 24975; bugfix on 0.3.2.1-alpha.
  • Minor features (denial-of-service avoidance, backport from 0.3.3.2-alpha):
    • Make our OOM handler aware of the geoip client history cache so it doesn’t fill up the memory. This check is important for IPv6 and our DoS mitigation subsystem. Closes ticket 25122.
  • Minor features (compatibility, OpenSSL, backport from 0.3.3.3-alpha):
    • Tor will now support TLS1.3 once OpenSSL 1.1.1 is released. Previous versions of Tor would not have worked with OpenSSL 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the ciphersuites it requires. Now we enable the TLS 1.3 ciphersuites. Closes ticket 24978.
  • Minor features (geoip):
    • Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2 Country database.
  • Minor features (logging, diagnostic, backport from 0.3.3.2-alpha):
    • When logging a failure to check a hidden service’s certificate, also log what the problem with the certificate was. Diagnostic for ticket 24972.
  • Minor bugfix (channel connection, backport from 0.3.3.2-alpha):
    • Use the actual observed address of an incoming relay connection, not the canonical address of the relay from its descriptor, when making decisions about how to handle the incoming connection. Fixes bug 24952; bugfix on 0.2.4.11-alpha. Patch by “ffmancera”.
  • Minor bugfixes (denial-of-service, backport from 0.3.3.3-alpha):
    • Fix a possible crash on malformed consensus. If a consensus had contained an unparseable protocol line, it could have made clients and relays crash with a null-pointer exception. To exploit this issue, however, an attacker would need to be able to subvert the directory authority system. Fixes bug 25251; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-004.
  • Minor bugfix (directory authority, backport from 0.3.3.2-alpha):
    • Directory authorities, when refusing a descriptor from a rejected relay, now explicitly tell the relay (in its logs) to set a valid ContactInfo address and contact the bad-relays@ mailing list. Fixes bug 25170; bugfix on 0.2.9.1.
  • Minor bugfixes (build, rust, backport from 0.3.3.1-alpha):
  • Minor bugfixes (onion services, backport from 0.3.3.2-alpha):
    • Remove a BUG() statement when a client fetches an onion descriptor that has a lower revision counter than the one in its cache. This can happen in normal circumstances due to HSDir desync. Fixes bug 24976; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (logging, backport from 0.3.3.2-alpha):
    • Don’t treat inability to store a cached consensus object as a bug: it can happen normally when we are out of disk space. Fixes bug 24859; bugfix on 0.3.1.1-alpha.
  • Minor bugfixes (performance, fragile-hardening, backport from 0.3.3.1-alpha):
    • Improve the performance of our consensus-diff application code when Tor is built with the –enable-fragile-hardening option set. Fixes bug 24826; bugfix on 0.3.1.1-alpha.
  • Minor bugfixes (OSX, backport from 0.3.3.1-alpha):
    • Don’t exit the Tor process if setrlimit() fails to change the file limit (which can happen sometimes on some versions of OSX). Fixes bug 21074; bugfix on 0.0.9pre5.
  • Minor bugfixes (spec conformance, backport from 0.3.3.3-alpha):
    • Forbid “-0” as a protocol version. Fixes part of bug 25249; bugfix on 0.2.9.4-alpha.
    • Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249; bugfix on 0.2.9.4-alpha.
  • Minor bugfixes (testing, backport from 0.3.3.1-alpha):
    • Fix a memory leak in the scheduler/loop_kist unit test. Fixes bug 25005; bugfix on 0.3.2.7-rc.
  • Minor bugfixes (v3 onion services, backport from 0.3.3.2-alpha):
    • Look at the “HSRend” protocol version, not the “HSDir” protocol version, when deciding whether a consensus entry can support the v3 onion service protocol as a rendezvous point. Fixes bug 25105; bugfix on 0.3.2.1-alpha.
  • Code simplification and refactoring (backport from 0.3.3.3-alpha):
    • Update the “rust dependencies” submodule to be a project-level repository, rather than a user repository. Closes ticket 25323.
  • Documentation (backport from 0.3.3.1-alpha):
    • Document that operators who run more than one relay or bridge are expected to set MyFamily and ContactInfo correctly. Closes ticket 24526.

原文:https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915



via 细节的力量 http://ift.tt/2DwjrZ6