Updated Tor Cloud images, and action required
The Tor Cloud images for all the seven regions have been updated to include the latest cloud image for stable Ubuntu release 10.04 LTS (Lucid Lynx). These new images are available on the Tor Cloud website.
If you are already running a Tor Cloud bridge, you will need to either manually update your image, or set up a new Tor Cloud bridge and terminate the old one. If you decide not to take action, your image may fail to download package updates correctly.
What follows is an important message from the ubuntu-cloud mailing list:
In an effort to improve on reliability of the Ubuntu archive mirrors for EC2 instances, Canonical is replacing the existing EC2 archive mirrors with mirrors backed by Amazon S3. This change itself will be done via modification of DNS entries and will be transparent to users.
However, due to a bug in the http pipelining implementation in S3 a change to apt configuration needs to be made to avoid download errors. We have chosen to deliver this change via a package upgrade in cloud-init.
The action required is one of the following:
- Upgrade cloud-init using sudo apt-get update ; sudo apt-get install -y cloud-init
- Launch official AMI's released after 2012-04-01, which will have the fix included
- Manually disable http pipeline use in apt using echo 'Acquire::http::Pipeline-Depth "0";' | sudo tee /etc/apt/apt.conf.d/99-no-pipelining
Should you choose not to take appropriate action, you will likely experience transient apt downloading errors after the change is implemented. In order to give appropriate time to apply the change, this transition will not occur before April 18, 2012.
Comments
Please note that the comment area below has been archived.
Hi an someone help me with a
Hi an someone help me with a privacy concern?
When using Tor Browser Bundle for browsing the web, is it theoretically safer (privacy wise) to disable "Javascript" and/or "Accept cookies from sites"? Or is it just as safe with those options enabled?
I would stay with the
I would stay with the recommended defaults.
Can you pls explain why?
Can you pls explain why? Does it lower your security/privacy if you disable those options? pls explain!
Im one of those who had
Im one of those who had disabled cookies. but a friend said to me that without any cookies then https encryption to websites will not work properly because the website does not know which computer it is communicating with and cant form an ecnryption tunnel through the proxy to the computer making the request. Is it true??
How will this protect from
How will this protect from CISPA?
since 4/21/2012 tor
since 4/21/2012
tor (obfsproxy) is not working in IRAN anymore!
tor stops at loading relay! here is what shows in log
----------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------
and filtering the DNS request as well
ping facebook.com
Pinging facebook.com [10.10.34.34] with 32 bytes of data:
Request timed out.
.
10.10.34.34 (Irans blocked page ip)
wiresharks showed that request to DNS send perfectly but in return if site is in black list the IP replace with 10.10.34.34 otherwise the request is intact!
none of the socks proxy is working, it just change the ip to proxy's ip but all the filter site is still filter (i think they can check and filter the packet from socks proxy)
AND freegate act unusual! about 5 hours couldn't find any server at all and later took more than 4-5 min to find server, but it seems working fine now!
i didn't know where to post this, so i did post here!
i will check the blog for update. if there is any information you need just ask in blog i will provide them.
thank you!