Today, the Tor Project’s Open Observatory of Network Interference (OONI) team released OONI Run, a website linked to an exciting new OONI Probe mobile app feature that enables you to engage your friends (and the world) to run censorship measurement tests and monitor the blocking of your website around the world.
Next month in Montreal, Tor folks from around the world will be convening to discuss the future of Tor as an organization and designing the protocols and features that we want to see in the future. As part of this meeting, we’re also having two open hack days everyone is welcome to join.
Hello! We found a security issue in the onion service code (CVE-2017-0380, TROVE-2017-008) that can cause sensitive information to be written to your logs if you have set the SafeLogging option to 0. If you are not running an onion service, or you have not changed the SafeLogging option from its default, you are not affected. If you are running 0.2.5, you are not affected. (0.2.4, 0.2.6, and 0.2.7 are no longer supported.) For more information, including workaround steps, see the advisory.
There's a new stable Tor release series available! After months of work, you can now download the source code for Tor 0.3.1.7 from the usual place on the website. Packages should become available over the coming days, including (we hope) a Tor Browser release before the end of the month.
Tor 0.3.1.7 is the first stable release in the 0.3.1 series.
Tor 0.3.2.1-alpha is the first release in the 0.3.2.x series. It includes support for our next-generation ("v3") onion service protocol, and adds a new circuit scheduler for more responsive forwarding decisions from relays. There are also numerous other small features and bugfixes here.
Tor 0.3.1.6-rc fixes a few small bugs and annoyances in the 0.3.1 release series, including a bug that produced weird behavior on Windows directory caches.
This is the first release candidate in the Tor 0.3.1 series. If we find no new bugs or regressions here, the first stable 0.3.1 release will be nearly identical to it. Please help find bugs! If we don't find any new critical problems, we'll be calling this release series "stable" soon.
If you build Tor from source, you can find Tor 0.3.1.6-rc at the usual place (at the Download page on our website). Otherwise, you'll probably want to wait until packages are available. There should be a new Tor Browser release later this month.
Changes in version 0.3.1.6-rc - 2017-09-05
Major bugfixes (windows, directory cache):
On Windows, do not try to delete cached consensus documents and diffs before they are unmapped from memory--Windows won't allow that. Instead, allow the consensus cache directory to grow larger, to hold files that might need to stay around longer. Fixes bug 22752; bugfix on 0.3.1.1-alpha.
Minor features (directory authority):
Improve the message that authorities report to relays that present RSA/Ed25519 keypairs that conflict with previously pinned keys. Closes ticket 22348.
It’s essential for us to reach people in areas in the world with heavy online surveillance and censorship, especially those in the Global South. Most people in these regions only use smartphones to access the internet, and we want to better support these users by upping our support for mobile browsing.