New Release: Tor 0.4.3.5
After months of work, we have a new stable release series! If you build Tor from source, you can download the source code for 0.4.3.5 on the website. Packages, including a new Tor Browser, should be available within the next several weeks.
Tor 0.4.3.5 is the first stable release in the 0.4.3.x series. This series adds support for building without relay code enabled, and implements functionality needed for OnionBalance with v3 onion services. It includes significant refactoring of our configuration and controller functionality, and fixes numerous smaller bugs and performance issues.
Per our support policy, we support each stable release series for nine months after its first stable release, or three months after the first stable release of the next series: whichever is longer. This means that 0.4.3.x will be supported until around February 2021--later, if 0.4.4.x is later than anticipated.
Note also that support for 0.4.1.x is about to end on May 20 of this year; 0.4.2.x will be supported until September 15. We still plan to continue supporting 0.3.5.x, our long-term stable series, until Feb 2022.
Below are the changes since 0.4.3.4-rc. For a complete list of changes since 0.4.2.6, see the ReleaseNotes file.
Changes in version 0.4.3.5 - 2020-05-15
- Minor bugfixes (compiler compatibility):
- Avoid compiler warnings from Clang 10 related to the use of GCC- style "/* falls through */" comments. Both Clang and GCC allow __attribute__((fallthrough)) instead, so that's what we're using now. Fixes bug 34078; bugfix on 0.3.1.3-alpha.
- Fix compilation warnings with GCC 10.0.1. Fixes bug 34077; bugfix on 0.4.0.3-alpha.
- Minor bugfixes (logging):
- Stop truncating IPv6 addresses and ports in channel and connection logs. Fixes bug 33918; bugfix on 0.2.4.4-alpha.
- Fix a logic error in a log message about whether an address was invalid. Previously, the code would never report that onion addresses were onion addresses. Fixes bug 34131; bugfix on 0.4.3.1-alpha.
Comments
Please note that the comment area below has been archived.
Thanks for all your hard…
Thanks for all your hard work on Tor! Is WTF-PAD still coming soon?
@ nickm: Very glad to know…
@ nickm: Very glad to know you are still working for TP! The recent announcement from the ED was worrying.
Despite the deteriorating fiscal situation, I hope TP can somehow assign someone to work with Debian Project to check on the health of the onion mirrors of the Debian software repository, which do not appear to be working. This was a fabulous innovation several years ago but it needs to be maintained. I'd also love to see similar mirrors for other repositories, e.g CRAN.
I believe it is important to pursue this during the pandemic because Citizen Lab and others confirm that COVID-19 researchers are being specifically targeted by state-sponsored hackers, and installing unsigned code is a too easy in to scientist's computers for the bad guys. Recall also that one of the revelations from the Snowden leaks was the governments had specifically targeted climate change researchers, including the USG targeting foreign scientists and academics (with no "national security" ties) who were attending scientific conferences in the USA.
I hope TP can reach out to EFF (eff.org) and Sen. Ron Wyden (D-OR) with respect to opposing the EARN IT act, supporting federal grants for FOSS software and RFA (Radio Free Asia), opposing warrant less web surveillance, etc. I believe that political threats to TP (especially in the USA) are just as important as the technical threats.
Are you sure the debian…
Are you sure the debian update mirrors aren't working? I used them recently and they worked fine for me...
Will 0.4.3.4rc be allowed in…
Will 0.4.3.4rc be allowed in the wild for a while ?
Yup, we don't un-recommend…
Yup, we don't un-recommend releases until there is a reason not to, and authorities don't start refusing relays running older versions unless they are seriously insecure or obsolete.
5/15/20, 14:23:39.980 [WARN]…
5/15/20, 14:23:39.980 [WARN] tor_bug_occurred_(): Bug: process_win32.c:891: process_win32_read_from_handle: Non-fatal assertion !(handle->reached_eof) failed. (on Tor 0.4.3.4-rc 251efd11e77df6c2)
5/15/20, 14:23:39.980 [WARN] Bug: Tor 0.4.3.4-rc (git-251efd11e77df6c2): Non-fatal assertion !(handle->reached_eof) failed in process_win32_read_from_handle at process_win32.c:891. (Stack trace not available) (on Tor 0.4.3.4-rc 251efd11e77df6c2)
Hi, apparently you have…
Hi,
apparently you have forgotten to upload the armhf package on deb.torproject.org.
According to https://deb.torproject.org/torproject.org/dists/buster/main/binary-armh… , 'tor-geoipdb' has been upgraded (0.4.3.5-1~d10.buster+1) whereas 'tor' has not (0.4.2.7-1~d10.buster+1). Would you upgrade and upload this latter as well, please?
Cheers
Hi! (My team doesn't…
Hi! (My team doesn't maintain the debian builds.)
It looks like the debian tor maintainer isn't able to do 32-bit arm builds any longer: https://lists.torproject.org/pipermail/tor-talk/2020-May/045582.html . He suggests some alternatives in that thread, which is probably a good place to discuss it more?
Can someone please explain…
Can someone please explain what to do now? tor-geoipdb wants to update but tor itself can´t. Any other source providing 32-bit arm binaries?
I built it using this very…
I built it using this very useful ressource : https://wiki.debian.org/BuildingTutorial
With the latest support for…
With the latest support for the v3 Onion balancing, when will the TP Hidden Services sites switch to v3?
Any word on Debian going to v3?
The post says this release…
The post says this release has code for OnionBalance with v3 onion services support but this does not appear to be true. Only the ChangeLog and ReleaseNotes mention this but no code for onionbalance is in the release.
so why is test version…
so why is test version still0434rc ,windows expert bundle still 0427(friendly smile)
In case anyone else was…
In case anyone else was looking for the changes since 0.4.2.6: https://gitweb.torproject.org/tor.git/plain/ReleaseNotes?h=tor-0.4.3.5