[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Jun 24 13:20:20 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/25 ===
===========================================================================

version 47
Author: lunar
Date:   2014-06-24T12:40:57+00:00

   FREEZE

--- version 46
+++ version 47
@@ -1,6 +1,8 @@
 ''51st issue of Tor Weekly News. Covering what's happening from June 17th, 2014 to June 24th, 2014. To be released on June 25th, 2014.''
 
 '''Editor:''' Lunar
+
+'''Status:''' Frozen. Technical and languages fixes only. New items should go to [wiki:TorWeeklyNews/2014/26 next week's edition]. Expected publication time 2014-06-25 12:00 UTC
 
 '''Subject:''' Tor Weekly News — June 25th, 2014
 
@@ -11,36 +13,36 @@
 
 Welcome to the twenty-fifth issue of Tor Weekly News in 2014, the weekly
 newsletter that covers what is happening in the community around Tor,
-the “fine-meshed net” [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033358.html
+the “fine-meshed net” [1].
+
+   [1]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033358.html
 
 Tor 0.2.5.5-alpha is out
 ------------------------
 
-Tor 0.2.5.5-alpha was released [XXX], fixing “a wide variety of
-remaining issues in the Tor 0.2.5.x release series, including a couple
-of DoS issues, some performance regressions, a large number of bugs
-affecting the Linux seccomp2 sandbox code, and various other bugfixes”,
-in Nick Mathewson’s words. Among the major security improvements is an
+Tor 0.2.5.5-alpha was released [2], fixing “a wide variety of remaining
+issues in the Tor 0.2.5.x release series, including a couple of DoS
+issues, some performance regressions, a large number of bugs affecting
+the Linux seccomp2 sandbox code, and various other bugfixes”, in Nick
+Mathewson’s words. Among the major security improvements is an
 adjustment to the way Tor decides when to close TLS connections, which
 “should improve Tor’s resistance against some kinds of traffic analysis,
 and lower some overhead from needlessly closed connections”.
 
-You can download the source tarball [XXX], or install the package by
-following the instructions for your system [XXX]. This release is also
-now available in Debian’s [XXX] and Tor Project’s repository [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033347.html
- [XXX]: https://www.torproject.org/dist/
- [XXX]: https://www.torproject.org/docs/installguide
- [XXX]: http://packages.qa.debian.org/t/tor/news/20140619T120436Z.html
- [XXX]: https://www.torproject.org/docs/debian.html.en#development
+You can download the source tarball [3], or install the package by
+following the instructions for your system [4]. This release is also now
+available in Debian’s [5] and Tor Project’s repository [6].
+
+   [2]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033347.html
+   [3]: https://www.torproject.org/dist/
+   [4]: https://www.torproject.org/docs/installguide
+   [5]: http://packages.qa.debian.org/t/tor/news/20140619T120436Z.html
+   [6]: https://www.torproject.org/docs/debian.html.en#development
 
 Debian Wheezy’s tor version to be updated
 -----------------------------------------
 
-Following a suggestion by Peter Palfrader [XXX], Debian developers are
+Following a suggestion by Peter Palfrader [7], Debian developers are
 preparing to update the version of tor found in the Debian stable
 repositories from 0.2.3.25 to 0.2.4.22. Among the chief motives for
 doing so is that “about a quarter of the Tor network (just considering
@@ -52,120 +54,122 @@
 against OpenSSL vulnerabilities discovered earlier this year, make this
 an attractive proposal.
 
-The update [XXX] will be shipped in the forthcoming point
-release (7.6) of Debian Wheezy, on July 12th.
-
- [XXX]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751977
- [XXX]: https://lists.debian.org/debian-changes/2014/06/msg00072.html
+The update [8] will be shipped in the forthcoming point release (7.6) of
+Debian Wheezy, on July 12th.
+
+   [7]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751977
+   [8]: https://lists.debian.org/debian-changes/2014/06/msg00072.html
 
 Miscellaneous news
 ------------------
 
 Building on the May release of experimental Tor Browsers hardened with
-AddressSanitizer (ASan) [XXX], Georg Koppen announced [XXX] a new set of
+AddressSanitizer (ASan) [9], Georg Koppen announced [10] a new set of
 experimental Linux builds that include both AddressSanitizer and
 Undefined Behaviour Sanitizer (UBSan), asking for testing and feedback.
 See Georg’s message for download and build instructions, as well as a
 couple of known issues.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
- [XXX]: https://lists.torproject.org/pipermail/tor-qa/2014-June/000428.html
-
-Nick Mathewson reminded [XXX] Tor users, relay operators, and especially
+   [9]: https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
+  [10]: https://lists.torproject.org/pipermail/tor-qa/2014-June/000428.html
+
+Nick Mathewson reminded [11] Tor users, relay operators, and especially
 hidden service administrators that tor’s 0.2.2 series is no longer
 supported, and many features will soon stop working entirely; if you are
 affected, then please upgrade!
 
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033376.html
+  [11]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033376.html
 
 Several of Tor’s Google Summer of Code students submitted their regular
 progress reports: Daniel Martí on the implementation of consensus
-diffs [XXX], Mikhail Belous on the multicore tor daemon [XXX], Juha
-Nurmi on the ahmia.fi project [XXX], Zack Mullaly on the HTTPS
-Everywhere secure ruleset update mechanism [XXX], Amogh Pradeep on the
-Orbot+Orfox project [XXX], Sreenatha Bhatlapenumarthi on the Tor Weather
-rewrite [XXX], Marc Juarez on the link-padding pluggable transport
-development [XXX], Israel Leiva on the GetTor revamp [XXX], Quinn
-Jarrell on the pluggable transport combiner [XXX], Kostas Jakeliunas
-on the BridgeDB Twitter Distributor [XXX], and Noah Rahman on
-Stegotorus security enhancement [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007030.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007034.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000564.html
- [XXX]: https://lists.eff.org/pipermail/https-everywhere/2014-June/002147.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007036.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007037.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000567.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007039.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007040.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007041.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007043.html
+diffs [12], Mikhail Belous on the multicore tor daemon [13], Juha Nurmi
+on the ahmia.fi project [14], Zack Mullaly on the HTTPS Everywhere
+secure ruleset update mechanism [15], Amogh Pradeep on the Orbot+Orfox
+project [16], Sreenatha Bhatlapenumarthi on the Tor Weather
+rewrite [17], Marc Juarez on the link-padding pluggable transport
+development [18], Israel Leiva on the GetTor revamp [19], Quinn Jarrell
+on the pluggable transport combiner [20], Kostas Jakeliunas on the
+BridgeDB Twitter Distributor [21], and Noah Rahman on Stegotorus
+security enhancement [22].
+
+  [12]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007030.html
+  [13]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007034.html
+  [14]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000564.html
+  [15]: https://lists.eff.org/pipermail/https-everywhere/2014-June/002147.html
+  [16]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007036.html
+  [17]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007037.html
+  [18]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000567.html
+  [19]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007039.html
+  [20]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007040.html
+  [21]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007041.html
+  [22]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007043.html
 
 Researchers from the Internet Geographies project at the Oxford Internet
-Institute produced a cartogram [XXX] of Tor users by country, using
+Institute produced a cartogram [23] of Tor users by country, using
 archived data freely available from the Tor Project’s own Metrics
-portal [XXX], along with an analysis of the resulting image. “As ever
+portal [24], along with an analysis of the resulting image. “As ever
 more governments seek to control and censor online activities, users
 face a choice to either perform their connected activities in ways that
 adhere to official policies, or to use anonymity to bring about a freer
 and more open Internet”, they conclude.
 
- [XXX]: http://geography.oii.ox.ac.uk/?page=tor
- [XXX]: https://metrics.torproject.org
-
-Andrew Lewman reported [XXX] that users with email addresses at Yahoo
-and AOL have been removed from the tor-relays mailing list [XXX], as
-these addresses have been bouncing list emails.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-
-Thanks to the FoDT.it webteam [XXX] and Maxanoo [XXX] for running
-mirrors of the Tor Project’s website!
-
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-June/000617.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-June/000619.html
-
-fr33tux shared [XXX] the slides [XXX] for a French-language presentation
+  [23]: http://geography.oii.ox.ac.uk/?page=tor
+  [24]: https://metrics.torproject.org
+
+Andrew Lewman reported [25] that users with email addresses at Yahoo and
+AOL have been removed from the tor-relays mailing list [26], as these
+addresses have been bouncing list emails.
+
+  [25]: https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html
+  [26]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
+
+Thanks to the FoDT.it webteam [27] and Maxanoo [28] for running mirrors
+of the Tor Project’s website!
+
+  [27]: https://lists.torproject.org/pipermail/tor-mirrors/2014-June/000617.html
+  [28]: https://lists.torproject.org/pipermail/tor-mirrors/2014-June/000619.html
+
+fr33tux shared [29] the slides [30] for a French-language presentation
 on Tor, delivered at Université de technologie Belfort-Montbéliard. The
-source code (in the LaTeX markup language) is also available [XXX]:
-“feel free to borrow whatever you want from it!”
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033337.html
- [XXX]: http://fr33tux.org/data/prez.pdf
- [XXX]: http://git.fr33tux.org/conference_tor_utbm.git
-
-Thanks to Ximin Luo, the server component of Flashproxy [XXX] is now available
-in Debian [XXX] in the “pt-websocket” package.
-
- [XXX]: https://crypto.stanford.edu/flashproxy/
- [XXX]: https://packages.debian.org/sid/pt-websocket
+source code (in the LaTeX markup language) is also available [31]: “feel
+free to borrow whatever you want from it!”
+
+  [29]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033337.html
+  [30]: http://fr33tux.org/data/prez.pdf
+  [31]: http://git.fr33tux.org/conference_tor_utbm.git
+
+Thanks to Ximin Luo, the server component of Flashproxy [32] is now
+available in Debian [33] in the “pt-websocket” package.
+
+  [32]: https://crypto.stanford.edu/flashproxy/
+  [33]: https://packages.debian.org/sid/pt-websocket
 
 A couple weeks ago Roger Dingledine wondered “how many relays are
 firewalling certain outbound ports (and thus messing with connectivity
-inside the Tor network)”. ra has just published the results [XXX] of a three
-weeks long test of the interconnectivity between 6730 relays. Contacting
-the relay operators of the problematic relay is probably the next step
-for who wish to keep the network at its best.
-
- [XXX]: https://bugs.torproject.org/12131#comment:11
-
-George Kadianakis slipped on his storyteller costume to guide us [XXX] through
-layers of the Tor core, motivated by the quest for knowledge. The cursing
-riddle, “Why does Roger has so many guards?”, has now an answer. Be ready
-for a “beautiful stalagmite” and the “truly amazing” nature of Tor!
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007042.html
+inside the Tor network)”. ra has just published the results [34] of a
+three weeks long test of the interconnectivity between 6730 relays.
+Contacting the relay operators of the problematic relay is probably the
+next step for who wish to keep the network at its best.
+
+  [34]: https://bugs.torproject.org/12131#comment:11
+
+George Kadianakis slipped on his storyteller costume to guide us [35]
+through layers of the Tor core, motivated by the quest for knowledge.
+The cursing riddle, “Why does Roger has so many guards?”, has now an
+answer. Be ready for a “beautiful stalagmite” and the “truly amazing”
+nature of Tor!
+
+  [35]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007042.html
 
 Tor help desk roundup
 ---------------------
 
-When the Tor Browser stalls while “loading the network status”, please double
-check that the system clock is accurate. Same for the timezone and daylight
-saving change. Tor needs an accurate clock to prevent from several class
-of attacks on its protocol. It won't work properly when the local time
-does not match the one used by other network participants.
+When the Tor Browser stalls while “loading the network status”, please
+double check that the system clock is accurate. Same for the timezone
+and daylight saving change. Tor needs an accurate clock to prevent from
+several class of attacks on its protocol. It won’t work properly when
+the local time does not match the one used by other network
+participants.
 
 Easy development tasks to get involved with
 -------------------------------------------
@@ -178,10 +182,10 @@
 but then concluded that his patch had a problem and went away. If you’re
 up to some digging into tor’s configuration file handling and want to
 clean up a two years old patch potentially to be included in tor 0.2.6,
-please find the details in the ticket [XXX]. It’s tagged as easy, so how
+please find the details in the ticket [36]. It’s tagged as easy, so how
 hard can it be?
 
- [XXX]: https://bugs.torproject.org/4019
+  [36]: https://bugs.torproject.org/4019
 
 Upcoming events
 ---------------
@@ -208,10 +212,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [37], write down your
+name and subscribe to the team mailing list [38] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+  [37]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [38]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}

version 46
Author: lunar
Date:   2014-06-24T12:38:23+00:00

   remove uncovered item

--- version 45
+++ version 46
@@ -215,7 +215,3 @@
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
-
-Possible items:
-
- * Composing multiple pluggable transports https://lists.torproject.org/pipermail/tor-dev/2014-June/007026.html

version 45
Author: lunar
Date:   2014-06-24T12:38:09+00:00

   credits

--- version 44
+++ version 45
@@ -203,8 +203,8 @@
                   | https://2014.rmll.info/?lang=en
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by harmony, Lunar,
+Matt Pagan, Karsten Loesing, and Roger Dingledine.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 44
Author: lunar
Date:   2014-06-24T12:36:54+00:00

   after unsuccessful tries to contact mttp over IRC to clarify about the
   roundup, mention time synchronizing issue instead of ethics; we can
   push the later to next week

--- version 43
+++ version 44
@@ -161,16 +161,11 @@
 Tor help desk roundup
 ---------------------
 
-The help desk has gotten asked about the "ethics behind Tor". Tor's technical 
-design decisions are laid out in our various design documents [XXX]. Videos 
-like Roger's talk at Internet Days [XXX] or Jake and Roger's talks at 
-the Chaos Communications Congress in 2011 [XXX] and 2013 [XXX] remain good
-resources on the  social and cultural motivations for Tor.
-
- [XXX]: https://gitweb.torproject.org/torspec.git
- [XXX]: https://media.torproject.org/video/tor-internet-days-2010.mp4
- [XXX]: https://media.torproject.org/video/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4
- [XXX]: https://media.torproject.org/video/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma_concat_.mp4
+When the Tor Browser stalls while “loading the network status”, please double
+check that the system clock is accurate. Same for the timezone and daylight
+saving change. Tor needs an accurate clock to prevent from several class
+of attacks on its protocol. It won't work properly when the local time
+does not match the one used by other network participants.
 
 Easy development tasks to get involved with
 -------------------------------------------

version 43
Author: lunar
Date:   2014-06-24T12:29:37+00:00

   adjust links

--- version 42
+++ version 43
@@ -149,7 +149,7 @@
 the relay operators of the problematic relay is probably the next step
 for who wish to keep the network at its best.
 
- [XXX]: https://trac.torproject.org/projects/tor/ticket/12131#comment:11
+ [XXX]: https://bugs.torproject.org/12131#comment:11
 
 George Kadianakis slipped on his storyteller costume to guide us [XXX] through
 layers of the Tor core, motivated by the quest for knowledge. The cursing
@@ -186,7 +186,7 @@
 please find the details in the ticket [XXX]. It’s tagged as easy, so how
 hard can it be?
 
- [XXX]: https://trac.torproject.org/projects/tor/ticket/4019
+ [XXX]: https://bugs.torproject.org/4019
 
 Upcoming events
 ---------------

version 42
Author: lunar
Date:   2014-06-24T12:24:16+00:00

   reword a bit, add missing link

--- version 41
+++ version 42
@@ -163,10 +163,11 @@
 
 The help desk has gotten asked about the "ethics behind Tor". Tor's technical 
 design decisions are laid out in our various design documents [XXX]. Videos 
-like Roger's talk at Internet Days [XXX] or Jake and Roger's various talks at 
-the Chaos Communications Congress [XXX] [XXX] remain good resources on the 
-social and cultural motivations for Tor.
-
+like Roger's talk at Internet Days [XXX] or Jake and Roger's talks at 
+the Chaos Communications Congress in 2011 [XXX] and 2013 [XXX] remain good
+resources on the  social and cultural motivations for Tor.
+
+ [XXX]: https://gitweb.torproject.org/torspec.git
  [XXX]: https://media.torproject.org/video/tor-internet-days-2010.mp4
  [XXX]: https://media.torproject.org/video/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4
  [XXX]: https://media.torproject.org/video/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma_concat_.mp4

version 41
Author: lunar
Date:   2014-06-24T12:22:25+00:00

   formatting

--- version 40
+++ version 41
@@ -167,16 +167,9 @@
 the Chaos Communications Congress [XXX] [XXX] remain good resources on the 
 social and cultural motivations for Tor.
 
-[XXX]: https://media.torproject.org/video/tor-internet-days-2010.mp4
-[XXX]: https://media.torproject.org/video/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4
-[XXX]: https://media.torproject.org/video/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma_concat_.mp4
-
-News from Tor StackExchange
----------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
+ [XXX]: https://media.torproject.org/video/tor-internet-days-2010.mp4
+ [XXX]: https://media.torproject.org/video/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4
+ [XXX]: https://media.torproject.org/video/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma_concat_.mp4
 
 Easy development tasks to get involved with
 -------------------------------------------
@@ -192,7 +185,7 @@
 please find the details in the ticket [XXX]. It’s tagged as easy, so how
 hard can it be?
 
-[XXX] https://trac.torproject.org/projects/tor/ticket/4019
+ [XXX]: https://trac.torproject.org/projects/tor/ticket/4019
 
 Upcoming events
 ---------------

version 40
Author: lunar
Date:   2014-06-24T12:18:06+00:00

   write about asn's journey

--- version 39
+++ version 40
@@ -150,6 +150,13 @@
 for who wish to keep the network at its best.
 
  [XXX]: https://trac.torproject.org/projects/tor/ticket/12131#comment:11
+
+George Kadianakis slipped on his storyteller costume to guide us [XXX] through
+layers of the Tor core, motivated by the quest for knowledge. The cursing
+riddle, “Why does Roger has so many guards?”, has now an answer. Be ready
+for a “beautiful stalagmite” and the “truly amazing” nature of Tor!
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/007042.html
 
 Tor help desk roundup
 ---------------------
@@ -223,4 +230,3 @@
 Possible items:
 
  * Composing multiple pluggable transports https://lists.torproject.org/pipermail/tor-dev/2014-June/007026.html
- * Journey to the core of Tor: Why does Roger has so many guards? (asn got style) https://lists.torproject.org/pipermail/tor-dev/2014-June/007042.html

version 39
Author: lunar
Date:   2014-06-24T12:10:09+00:00

   add events

--- version 38
+++ version 39
@@ -190,13 +190,21 @@
 Upcoming events
 ---------------
 
-Jul XX-XX | Event XXX brief description
-          | Event City, Event Country
-          | Event website URL
-          |
-Jul XX-XX | Event XXX brief description
-          | Event City, Event Country
-          | Event website URL
+June 25 19:00 UTC | little-t tor development meeting
+                  | #tor-dev, irc.oftc.net
+                  | https://lists.torproject.org/pipermail/tor-dev/2014-May/006888.html
+                  |
+June 27 15:00 UTC | Tor Browser online meeting
+                  | #tor-dev, irc.oftc.net
+                  | https://lists.torproject.org/pipermail/tbb-dev/2014-April/000049.html
+                  |
+ June 30 — July 4 | Tor’s Summer Dev Meeting
+                  | Paris, France
+                  | https://trac.torproject.org/projects/tor/wiki/org/meetings/2014SummerDevMeeting
+                  |
+        July 5-11 | Lunar @ Libre Software Meeting 2014
+                  | Montpellier, France
+                  | https://2014.rmll.info/?lang=en
 
 
 This issue of Tor Weekly News has been assembled by XXX, XXX, and

version 38
Author: lunar
Date:   2014-06-24T11:59:50+00:00

   write about interconnectivity measurements

--- version 37
+++ version 38
@@ -142,6 +142,15 @@
  [XXX]: https://crypto.stanford.edu/flashproxy/
  [XXX]: https://packages.debian.org/sid/pt-websocket
 
+A couple weeks ago Roger Dingledine wondered “how many relays are
+firewalling certain outbound ports (and thus messing with connectivity
+inside the Tor network)”. ra has just published the results [XXX] of a three
+weeks long test of the interconnectivity between 6730 relays. Contacting
+the relay operators of the problematic relay is probably the next step
+for who wish to keep the network at its best.
+
+ [XXX]: https://trac.torproject.org/projects/tor/ticket/12131#comment:11
+
 Tor help desk roundup
 ---------------------
 
@@ -206,5 +215,4 @@
 Possible items:
 
  * Composing multiple pluggable transports https://lists.torproject.org/pipermail/tor-dev/2014-June/007026.html
- * ra has published measurement of interconnectivity between 6730 relays https://trac.torproject.org/projects/tor/ticket/12131#comment:11
  * Journey to the core of Tor: Why does Roger has so many guards? (asn got style) https://lists.torproject.org/pipermail/tor-dev/2014-June/007042.html

version 37
Author: lunar
Date:   2014-06-24T11:56:40+00:00

   write about pt-websocket in Debian

--- version 36
+++ version 37
@@ -136,6 +136,12 @@
  [XXX]: http://fr33tux.org/data/prez.pdf
  [XXX]: http://git.fr33tux.org/conference_tor_utbm.git
 
+Thanks to Ximin Luo, the server component of Flashproxy [XXX] is now available
+in Debian [XXX] in the “pt-websocket” package.
+
+ [XXX]: https://crypto.stanford.edu/flashproxy/
+ [XXX]: https://packages.debian.org/sid/pt-websocket
+
 Tor help desk roundup
 ---------------------
 
@@ -200,6 +206,5 @@
 Possible items:
 
  * Composing multiple pluggable transports https://lists.torproject.org/pipermail/tor-dev/2014-June/007026.html
- * pt-websocket in Debian unstable http://packages.qa.debian.org/p/pt-websocket/news/20140620T130008Z.html
  * ra has published measurement of interconnectivity between 6730 relays https://trac.torproject.org/projects/tor/ticket/12131#comment:11
  * Journey to the core of Tor: Why does Roger has so many guards? (asn got style) https://lists.torproject.org/pipermail/tor-dev/2014-June/007042.html

version 36
Author: lunar
Date:   2014-06-24T11:42:21+00:00

   mention deb.tpo

--- version 35
+++ version 36
@@ -29,12 +29,13 @@
 
 You can download the source tarball [XXX], or install the package by
 following the instructions for your system [XXX]. This release is also
-now available in Debian’s unstable repository [XXX].
+now available in Debian’s [XXX] and Tor Project’s repository [XXX].
 
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033347.html
  [XXX]: https://www.torproject.org/dist/
  [XXX]: https://www.torproject.org/docs/installguide
  [XXX]: http://packages.qa.debian.org/t/tor/news/20140619T120436Z.html
+ [XXX]: https://www.torproject.org/docs/debian.html.en#development
 
 Debian Wheezy’s tor version to be updated
 -----------------------------------------



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list