Tor Browser 8.0.1 is now available from the Tor Browser Project page [1]
and also from our distribution directory [2].
1: https://www.torproject.org/download/download-easy.html
2: https://www.torproject.org/dist/torbrowser/8.0.1/
This release features important security updates [3] to Firefox. Note
that we just picked up the necessary patches this time but did not bump
the Firefox version to 60.2.1esr as we needed to start building before
Mozilla was ready. Thus, users are fine with Tor Browser 8.0.1 even if
the Firefox version says 60.2.0esr.
3: https://www.mozilla.org/en-US/security/advisories/mfsa2018-23/
Moreover, Alex Catarineu from Cliqz found a mistake we made that would
make it possible to trick a user into installing an unsigned Torbutton
extension. Thus, all users are encouraged to update older Tor Browser
versions to 8.0.1 and keep in mind that installing third party extensions
is potentially dangerous to Tor Browser's privacy guarantees and
therefore strongly discouraged.
Tor Browser 8.0.1 is shipping the first stable Tor in the 0.3.4 series
(0.3.4.8) which solves an annoying crash bug [4] on older macOS systems
(10.9.x).
4: https://trac.torproject.org/projects/tor/ticket/27482
We found a better solution to our User Agent treatment [5]: on desktop
platforms Tor Browser will send a Windows User Agent at the network
level now while still allowing to query the unspoofed User Agent with
JavaScript. This takes concerns about any server passively logging the
User Agent into account while still avoiding broken websites as good as
we can. Thanks to everyone who helped with this issue.
5: https://trac.torproject.org/projects/tor/ticket/26146
Finally, we included a banner for signing up to Tor News which allows
anyone to stay up-to-date about things going on in the Tor universe
(which is, admittedly, sometimes hard to keep track of).
_Known Issues_
We already collected a number of unresolved bugs since Tor Browser
7.5.6 and tagged them with our tbb-8.0-issues [6] keyword to keep them
on our radar. While we fixed a number of them for the 8.0.1 release,
there are still issues remaining. The most important ones are listed
below:
6: https://trac.torproject.org/projects/tor/query?status=!closed&keywords=…
* WebGL is broken [7] right now.
7: https://trac.torproject.org/projects/tor/ticket/27290
* Accessibility support is broken [8] on Windows. We are considering
options to address this issue right now.
8: https://trac.torproject.org/projects/tor/ticket/27503
* Tor Browser 8 is not starting anymore on some older Ubuntu/Mint
Linux systems [9]. We still have issues to reproduce this bug but
hope we can fix it in the next release.
9: https://trac.torproject.org/projects/tor/ticket/27508
* Tor Browser 8 is not starting anymore on CentOS 6 [10]. We have a
fix in our upcoming 8.5a2 to give it a bit of testing. Users affected
by this bug may resort to that alpha version for now. We plan to
backport the patch in the next stable release.
10: https://trac.torproject.org/projects/tor/ticket/27552
* NoScript is not saving per-site permissions anymore [11]. We have
a potential patch for this bug in our 8.5a2 release as well and
plan to backport it, too, in the next stable release in case no
issues with it are found.
11: https://trac.torproject.org/projects/tor/ticket/27175
Note: The changelog file has an incorrect release date (September 24
instead of September 22).
The full changelog since Tor Browser 8.0 is:
* All platforms
* Update Tor to 0.3.4.8
* Update Torbutton to 2.0.7
* Bug 27097: Tor News signup banner
* Bug 27663: Add New Identity menuitem again
* Bug 26624: Only block OBJECT on highest slider level
* Bug 26555: Don't show IP address for meek or snowflake
* Bug 27478: Torbutton icons for dark theme
* Bug 27506+14520: Move status version to upper left corner for RTL locales
* Bug 27427: Fix NoScript IPC for about:blank by whitelisting messages
* Bug 27558: Update the link to "Your Guard note may not change" text
* Translations update
* Update Tor Launcher to 0.2.16.6
* Bug 27469: Adapt Moat URLs
* Translations update
* Clean-up
* Update NoScript to 10.1.9.6
* Bug 27763: Restrict Torbutton signing exemption to mobile
* Bug 26146: Spoof HTTP User-Agent header for desktop platforms
* Bug 27543: QR code is broken on web.whatsapp.com
* Bug 27264: Bookmark items are not visible on the boomark toolbar
* Bug 27535: Enable TLS 1.3 draft version
* Backport of Mozilla bug 1490585, 1475775, and 1489744
* OS X
* Bug 27482: Fix crash during start-up on macOS 10.9.x systems
* Linux
* Bug 26556: Fix broken Tor Browser icon path on Linux
Hello, everyone!
(If you are about to reply saying "please take me off this list",
instead please follow these instructions:
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-announce/
. If you have trouble, it is probably because you subscribed using a
different address than the one you are trying to unsubscribe with. You
will have to enter the actual email address you used when you
subscribed.)
After months of work, Tor 0.3.4.8 is now available! This is the first
stable release in the 0.3.4 series, and we hope you find it useful.
You can download the source code from the usual place on the website's
download page, under "source code". Packages should be available
within the next several weeks, with a new Tor Browser by some time
next week.
Also today we are releasing updates for our other supported stable
series: Tor 0.2.9.17, Tor 0.3.2.12, and Tor 0.3.3.10. You can
download the source code for older supported releases from
https://dist.torproject.org/. Their changelogs are available at:
https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.2.9.17https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.2.12https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.3.10
Below is the list of changes in Tor 0.3.4.8 since 0.3.3.9. For a list
of only those changes made since 0.3.4.8-rc, see the 0.3.4.8
changelog.
Changes in version 0.3.4.8 - 2018-09-10
Tor 0.3.4.8 is the first stable release in its series; it includes
compilation and portability fixes.
The Tor 0.3.4 series includes improvements for running Tor in
low-power and embedded environments, which should help performance in
general. We've begun work on better modularity, and included preliminary
changes on the directory authority side to accommodate a new bandwidth
measurement system. We've also integrated more continuous-integration
systems into our development process, and made corresponding changes to
Tor's testing infrastructure. Finally, we've continued to refine
our anti-denial-of-service code.
Below are the changes since 0.3.3.9. For a list of only the changes
since 0.3.4.7-rc, see the ChangeLog file.
o New system requirements:
- Tor no longer tries to support old operating systems without
mmap() or some local equivalent. Apparently, compilation on such
systems has been broken for some time, without anybody noticing or
complaining. Closes ticket 25398.
o Major features (directory authority, modularization):
- The directory authority subsystem has been modularized. The code
is now located in src/or/dirauth/, and is compiled in by default.
To disable the module, the configure option
--disable-module-dirauth has been added. This module may be
disabled by default in some future release. Closes ticket 25610.
o Major features (main loop, CPU usage):
- When Tor is disabled (via DisableNetwork or via hibernation), it
no longer needs to run any per-second events. This change should
make it easier for mobile applications to disable Tor while the
device is sleeping, or Tor is not running. Closes ticket 26063.
- Tor no longer enables all of its periodic events by default.
Previously, Tor would enable all possible main loop events,
regardless of whether it needed them. Furthermore, many of these
events are now disabled when Tor is hibernating or DisableNetwork
is set. This is a big step towards reducing client CPU usage by
reducing the amount of wake-ups the daemon does. Closes tickets
25376 and 25762.
- The bandwidth-limitation logic has been refactored so that
bandwidth calculations are performed on-demand, rather than every
TokenBucketRefillInterval milliseconds. This change should improve
the granularity of our bandwidth calculations, and limit the
number of times that the Tor process needs to wake up when it is
idle. Closes ticket 25373.
- Move responsibility for many operations from a once-per-second
callback to a callback that is only scheduled as needed. Moving
this functionality has allowed us to disable the callback when
Tor's network is disabled. Once enough items are removed from our
once-per-second callback, we can eliminate it entirely to conserve
CPU when idle. The functionality removed includes: closing
connections, circuits, and channels (ticket 25932); consensus
voting (25937); flushing log callbacks (25951); honoring delayed
SIGNEWNYM requests (25949); rescanning the consensus cache
(25931); saving the state file to disk (25948); warning relay
operators about unreachable ports (25952); and keeping track of
Tor's uptime (26009).
o Minor features (accounting):
- When Tor becomes dormant, it now uses a scheduled event to wake up
at the right time. Previously, we would use the per-second timer
to check whether to wake up, but we no longer have any per-second
timers enabled when the network is disabled. Closes ticket 26064.
o Minor features (bug workaround):
- Compile correctly on systems that provide the C11 stdatomic.h
header, but where C11 atomic functions don't actually compile.
Closes ticket 26779; workaround for Debian issue 903709.
o Minor features (code quality):
- Add optional spell-checking for the Tor codebase, using the
"misspell" program. To use this feature, run "make check-typos".
Closes ticket 25024.
o Minor features (compatibility):
- Tell OpenSSL to maintain backward compatibility with previous
RSA1024/DH1024 users in Tor. With OpenSSL 1.1.1-pre6, these
ciphers are disabled by default. Closes ticket 27344.
- Tor now detects versions of OpenSSL 1.1.0 and later compiled with
the no-deprecated option, and builds correctly with them. Closes
tickets 19429, 19981, and 25353.
o Minor features (compilation):
- When compiling with --enable-openbsd-malloc or --enable-tcmalloc,
tell the compiler not to include the system malloc implementation.
Fixes bug 20424; bugfix on 0.2.0.20-rc.
- Don't try to use a pragma to temporarily disable the
-Wunused-const-variable warning if the compiler doesn't support
it. Fixes bug 26785; bugfix on 0.3.2.11.
- When building Tor, prefer to use Python 3 over Python 2, and more
recent (contemplated) versions over older ones. Closes
ticket 26372.
o Minor features (compression, zstd):
- When running with zstd, Tor now considers using advanced functions
that the zstd maintainers have labeled as potentially unstable. To
prevent breakage, Tor will only use this functionality when the
runtime version of the zstd library matches the version with which
Tor was compiled. Closes ticket 25162.
o Minor features (configuration):
- The "DownloadSchedule" options have been renamed to end with
"DownloadInitialDelay". The old names are still allowed, but will
produce a warning. Comma-separated lists are still permitted for
these options, but all values after the first are ignored (as they
have been since 0.2.9). Closes ticket 23354.
o Minor features (continuous integration):
- Log the compiler path and version during Appveyor builds.
Implements ticket 27449.
- Show config.log and test-suite.log after failed Appveyor builds.
Also upload the zipped full logs as a build artifact. Implements
ticket 27430.
- Backport Travis rust distcheck to 0.3.3. Closes ticket 24629.
- Enable macOS builds in our Travis CI configuration. Closes
ticket 24629.
- Install libcap-dev and libseccomp2-dev so these optional
dependencies get tested on Travis CI. Closes ticket 26560.
- Only post Appveyor IRC notifications when the build fails.
Implements ticket 27275.
- Run asciidoc during Travis CI. Implements ticket 27087.
- Use ccache in our Travis CI configuration. Closes ticket 26952.
- Add the necessary configuration files for continuous integration
testing on Windows, via the Appveyor platform. Closes ticket
25549. Patches from Marcin Cieślak and Isis Lovecruft.
o Minor features (continuous integration, rust):
- Use cargo cache in our Travis CI configuration. Closes
ticket 26952.
o Minor features (control port):
- Introduce GETINFO "current-time/{local,utc}" to return the local
and UTC times respectively in ISO format. This helps a controller
like Tor Browser detect a time-related error. Closes ticket 25511.
Patch by Neel Chauhan.
- Introduce new fields to the CIRC_BW event. There are two new
fields in each of the read and written directions. The DELIVERED
fields report the total valid data on the circuit, as measured by
the payload sizes of verified and error-checked relay command
cells. The OVERHEAD fields report the total unused bytes in each
of these cells. Closes ticket 25903.
o Minor features (controller):
- The control port now exposes the list of HTTPTunnelPorts and
ExtOrPorts via GETINFO net/listeners/httptunnel and
net/listeners/extor respectively. Closes ticket 26647.
o Minor features (directory authorities):
- Stop warning about incomplete bw lines before the first complete
bw line has been found, so that additional header lines can be
ignored. Fixes bug 25960; bugfix on 0.2.2.1-alpha
- Authorities no longer vote to make the subprotocol version
"LinkAuth=1" a requirement: it is unsupportable with NSS, and
hasn't been needed since Tor 0.3.0.1-alpha. Closes ticket 27286.
o Minor features (directory authority):
- Directory authorities now open their key-pinning files as O_SYNC,
to limit their chances of accidentally writing partial lines.
Closes ticket 23909.
o Minor features (directory authority, forward compatibility):
- Make the lines of the measured bandwidth file able to contain
their entries in any order. Previously, the node_id entry needed
to come first. Closes ticket 26004.
o Minor features (entry guards):
- Introduce a new torrc option NumPrimaryGuards for controlling the
number of primary guards. Closes ticket 25843.
o Minor features (geoip):
- Update geoip and geoip6 to the August 7 2018 Maxmind GeoLite2
Country database. Closes ticket 27089.
o Minor features (performance):
- Avoid a needless call to malloc() when processing an incoming
relay cell. Closes ticket 24914.
- Make our timing-wheel code run a tiny bit faster on 32-bit
platforms, by preferring 32-bit math to 64-bit. Closes
ticket 24688.
- Avoid a needless malloc()/free() pair every time we handle an ntor
handshake. Closes ticket 25150.
o Minor features (Rust, portability):
- Rust cross-compilation is now supported. Closes ticket 25895.
o Minor features (testing):
- Add a unit test for voting_schedule_get_start_of_next_interval().
Closes ticket 26014, and helps make unit test coverage
more deterministic.
- A new unittests module specifically for testing the functions in
the (new-ish) bridges.c module has been created with new
unittests, raising the code coverage percentages. Closes 25425.
- We now have improved testing for addressmap_get_virtual_address()
function. This should improve our test coverage, and make our test
coverage more deterministic. Closes ticket 25993.
o Minor features (timekeeping, circuit scheduling):
- When keeping track of how busy each circuit have been recently on
a given connection, use coarse-grained monotonic timers rather
than gettimeofday(). This change should marginally increase
accuracy and performance. Implements part of ticket 25927.
o Minor features (unit tests):
- Test complete bandwidth measurements files, and test that
incomplete bandwidth lines only give warnings when the end of the
header has not been detected. Fixes bug 25947; bugfix
on 0.2.2.1-alpha
o Minor bugfixes (bandwidth management):
- Consider ourselves "low on write bandwidth" if we have exhausted
our write bandwidth some time in the last second. This was the
documented behavior before, but the actual behavior was to change
this value every TokenBucketRefillInterval. Fixes bug 25828;
bugfix on 0.2.3.5-alpha.
o Minor bugfixes (C correctness):
- Add a missing lock acquisition in the shutdown code of the control
subsystem. Fixes bug 25675; bugfix on 0.2.7.3-rc. Found by
Coverity; this is CID 1433643.
o Minor bugfixes (code style):
- Fixed multiple includes of transports.h in src/or/connection.c
Fixes bug 25261; bugfix on 0.2.5.1-alpha.
- Remove the unused variable n_possible from the function
channel_get_for_extend(). Fixes bug 25645; bugfix on 0.2.4.4-alpha
o Minor bugfixes (compilation):
- Silence a spurious compiler warning on the GetAdaptersAddresses
function pointer cast. This issue is already fixed by 26481 in
0.3.5 and later, by removing the lookup and cast. Fixes bug 27465;
bugfix on 0.2.3.11-alpha.
- Stop calling SetProcessDEPPolicy() on 64-bit Windows. It is not
supported, and always fails. Some compilers warn about the
function pointer cast on 64-bit Windows. Fixes bug 27461; bugfix
on 0.2.2.23-alpha.
- Fix a compilation warning on some versions of GCC when building
code that calls routerinfo_get_my_routerinfo() twice, assuming
that the second call will succeed if the first one did. Fixes bug
26269; bugfix on 0.2.8.2-alpha.
- Refrain from compiling unit testing related object files when
--disable-unittests is set to configure script. Fixes bug 24891;
bugfix on 0.2.5.1-alpha.
- The --enable-fatal-warnings flag now affects Rust code as well.
Closes ticket 26245.
- Avoid a compiler warning when casting the return value of
smartlist_len() to double with DEBUG_SMARTLIST enabled. Fixes bug
26283; bugfix on 0.2.4.10-alpha.
o Minor bugfixes (compilation, windows):
- Don't link or search for pthreads when building for Windows, even
if we are using build environment (like mingw) that provides a
pthreads library. Fixes bug 27081; bugfix on 0.1.0.1-rc.
o Minor bugfixes (continuous integration):
- Build with zstd on macOS. Fixes bug 27090; bugfix on 0.3.1.5-alpha.
- Skip a pair of unreliable key generation tests on Windows, until
the underlying issue in bug 26076 is resolved. Fixes bug 26830 and
bug 26853; bugfix on 0.2.7.3-rc and 0.3.2.1-alpha respectively.
o Minor bugfixes (control port):
- Respond with more human-readable error messages to GETINFO exit-
policy/* requests. Also, let controller know if an error is
transient (response code 551) or not (response code 552). Fixes
bug 25852; bugfix on 0.2.8.1-alpha.
- Parse the "HSADDRESS=" parameter in HSPOST commands properly.
Previously, it was misparsed and ignored. Fixes bug 26523; bugfix
on 0.3.3.1-alpha. Patch by "akwizgran".
- Make CIRC_BW event reflect the total of all data sent on a
circuit, including padding and dropped cells. Also fix a mis-
counting bug when STREAM_BW events were enabled. Fixes bug 25400;
bugfix on 0.2.5.2-alpha.
o Minor bugfixes (correctness, flow control):
- Upon receiving a stream-level SENDME cell, verify that our window
has not grown too large. Fixes bug 26214; bugfix on svn
r54 (pre-0.0.1)
o Minor bugfixes (directory authority):
- When voting for recommended versions, make sure that all of the
versions are well-formed and parsable. Fixes bug 26485; bugfix
on 0.1.1.6-alpha.
o Minor bugfixes (directory client):
- When unverified-consensus is verified, rename it to cached-
consenus. Fixes bug 4187; bugfix on 0.2.0.3-alpha.
- Fixed launching a certificate fetch always during the scheduled
periodic consensus fetch by fetching only in those cases when
consensus are waiting for certs. Fixes bug 24740; bugfix
on 0.2.9.1-alpha.
o Minor bugfixes (error reporting):
- Improve tolerance for directory authorities with skewed clocks.
Previously, an authority with a clock more than 60 seconds ahead
could cause a client with a correct clock to warn that the
client's clock was behind. Now the clocks of a majority of
directory authorities have to be ahead of the client before this
warning will occur. Fixes bug 25756; bugfix on 0.2.2.25-alpha.
o Minor bugfixes (in-process restart):
- Always call tor_free_all() when leaving tor_run_main(). When we
did not, restarting tor in-process would cause an assertion
failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
o Minor bugfixes (Linux seccomp2 sandbox):
- Fix a bug in our sandboxing rules for the openat() syscall.
Previously, no openat() call would be permitted, which would break
filesystem operations on recent glibc versions. Fixes bug 25440;
bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
o Minor bugfixes (logging):
- Improve the log message when connection initiators fail to
authenticate direct connections to relays. Fixes bug 26927; bugfix
on 0.3.0.1-alpha.
o Minor bugfixes (onion services):
- Silence a spurious compiler warning in
rend_client_send_introduction(). Fixes bug 27463; bugfix
on 0.1.1.2-alpha.
- Fix bug that causes services to not ever rotate their descriptors
if they were getting SIGHUPed often. Fixes bug 26932; bugfix
on 0.3.2.1-alpha.
- Recompute some consensus information after detecting a clock jump,
or after transitioning from a non-live consensus to a live
consensus. We do this to avoid having an outdated state, and
miscalculating the index for next-generation onion services. Fixes
bug 24977; bugfix on 0.3.2.1-alpha.
o Minor bugfixes (portability):
- Fix compilation of the unit tests on GNU/Hurd, which does not
define PATH_MAX. Fixes bug 26873; bugfix on 0.3.3.1-alpha. Patch
from "paulusASol".
- Work around two different bugs in the OS X 10.10 and later SDKs
that would prevent us from successfully targeting earlier versions
of OS X. Fixes bug 26876; bugfix on 0.3.3.1-alpha.
- Do not align mmap length, as it is not required by POSIX, and the
getpagesize function is deprecated. Fixes bug 25399; bugfix
on 0.1.1.23.
o Minor bugfixes (portability, FreeBSD):
- In have_enough_mem_for_dircache(), the variable DIRCACHE_MIN_MEM_MB
does not stringify on FreeBSD, so we switch to tor_asprintf().
Fixes bug 20887; bugfix on 0.2.8.1-alpha. Patch by Neel Chauhan.
o Minor bugfixes (relay statistics):
- When a relay is collecting internal statistics about how many
create cell requests it has seen of each type, accurately count
the requests from relays that temporarily fall out of the
consensus. (To be extra conservative, we were already ignoring
requests from clients in our counts, and we continue ignoring them
here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
o Minor bugfixes (rust):
- Backport test_rust.sh from master. Fixes bug 26497; bugfix
on 0.3.1.5-alpha.
- Protover parsing was accepting the presence of whitespace in
version strings, which the C implementation would choke on, e.g.
"Desc=1\t,2". Fixes bug 27177; bugfix on 0.3.3.5-rc.
- Protover parsing was ignoring a 2nd hyphen and everything after
it, accepting entries like "Link=1-5-foo". Fixes bug 27164; bugfix
on 0.3.3.1-alpha.
- Stop setting $CARGO_HOME. cargo will use the user's $CARGO_HOME, or
$HOME/.cargo by default. Fixes bug 26497; bugfix on 0.3.1.5-alpha.
- cd to ${abs_top_builddir}/src/rust before running cargo in
src/test/test_rust.sh. This makes the working directory consistent
between builds and tests. Fixes bug 26497; bugfix on 0.3.3.2-alpha.
o Minor bugfixes (single onion services, Tor2web):
- Log a protocol warning when single onion services or Tor2web
clients fail to authenticate direct connections to relays. Fixes
bug 26924; bugfix on 0.2.9.1-alpha.
o Minor bugfixes (test coverage tools):
- Update our "cov-diff" script to handle output from the latest
version of gcov, and to remove extraneous timestamp information
from its output. Fixes bugs 26101 and 26102; bugfix
on 0.2.5.1-alpha.
o Minor bugfixes (testing):
- Disable core dumps in test_bt.sh, to avoid failures in "make
distcheck". Fixes bug 26787; bugfix on 0.2.5.2-alpha.
- When testing workqueue event-cancellation, make sure that we
actually cancel an event, and that cancel each event with equal
probability. (It was previously possible, though extremely
unlikely, for our event-canceling test not to cancel any events.)
Fixes bug 26008; bugfix on 0.2.6.3-alpha.
- Repeat part of the test in test_client_pick_intro() a number of
times, to give it consistent coverage. Fixes bug 25996; bugfix
on 0.3.2.1-alpha.
- Remove randomness from the hs_common/responsible_hsdirs test, so
that it always takes the same path through the function it tests.
Fixes bug 25997; bugfix on 0.3.2.1-alpha.
- Change the behavior of the "channel/outbound" test so that it
never causes a 10-second rollover for the EWMA circuitmux code.
Previously, this behavior would happen randomly, and result in
fluctuating test coverage. Fixes bug 25994; bugfix
on 0.3.3.1-alpha.
- Use X509_new() to allocate certificates that will be freed later
with X509_free(). Previously, some parts of the unit tests had
used tor_malloc_zero(), which is incorrect, and which caused test
failures on Windows when they were built with extra hardening.
Fixes bugs 25943 and 25944; bugfix on 0.2.8.1-alpha. Patch by
Marcin Cieślak.
- While running the circuit_timeout test, fix the PRNG to a
deterministic AES stream, so that the test coverage from this test
will itself be deterministic. Fixes bug 25995; bugfix
on 0.2.2.2-alpha.
o Minor bugfixes (testing, bootstrap):
- When calculating bootstrap progress, check exit policies and the
exit flag. Previously, Tor would only check the exit flag, which
caused race conditions in small and fast networks like chutney.
Fixes bug 27236; bugfix on 0.2.6.3-alpha.
o Minor bugfixes (testing, chutney):
- When running make test-network-all, use the mixed+hs-v2 network.
(A previous fix to chutney removed v3 onion services from the
mixed+hs-v23 network, so seeing "mixed+hs-v23" in tests is
confusing.) Fixes bug 27345; bugfix on 0.3.2.1-alpha.
- Before running make test-network-all, delete old logs and test
result files, to avoid spurious failures. Fixes bug 27295; bugfix
on 0.2.7.3-rc.
o Minor bugfixes (testing, openssl compatibility):
- Our "tortls/cert_matches_key" unit test no longer relies on
OpenSSL internals. Previously, it relied on unsupported OpenSSL
behavior in a way that caused it to crash with OpenSSL 1.0.2p.
Fixes bug 27226; bugfix on 0.2.5.1-alpha.
o Minor bugfixes (v3 onion services):
- Stop sending ed25519 link specifiers in v3 onion service introduce
cells and descriptors, when the rendezvous or introduction point
doesn't support ed25519 link authentication. Fixes bug 26627;
bugfix on 0.3.2.4-alpha.
o Minor bugfixes (vanguards):
- Allow the last hop in a vanguard circuit to be the same as our
first, to prevent the adversary from influencing guard node choice
by choice of last hop. Also prevent the creation of A - B - A
paths, or A - A paths, which are forbidden by relays. Fixes bug
25870; bugfix on 0.3.3.1-alpha.
o Minor bugfixes (Windows, compilation):
- Silence a compilation warning on MSVC 2017 and clang-cl. Fixes bug
27185; bugfix on 0.2.2.2-alpha.
o Code simplification and refactoring:
- Remove duplicate code in parse_{c,s}method_line and bootstrap
their functionalities into a single function. Fixes bug 6236;
bugfix on 0.2.3.6-alpha.
- We remove the PortForwsrding and PortForwardingHelper options,
related functions, and the port_forwarding tests. These options
were used by the now-deprecated Vidalia to help ordinary users
become Tor relays or bridges. Closes ticket 25409. Patch by
Neel Chauhan.
- In order to make the OR and dir checking function in router.c less
confusing we renamed some functions and
consider_testing_reachability() has been split into
router_should_check_reachability() and
router_do_reachability_checks(). Also we improved the documentation
in some functions. Closes ticket 18918.
- Initial work to isolate Libevent usage to a handful of modules in
our codebase, to simplify our call structure, and so that we can
more easily change event loops in the future if needed. Closes
ticket 23750.
- Introduce a function to call getsockname() and return tor_addr_t,
to save a little complexity throughout the codebase. Closes
ticket 18105.
- Make hsdir_index in node_t a hsdir_index_t rather than a pointer
as hsdir_index is always present. Also, we move hsdir_index_t into
or.h. Closes ticket 23094. Patch by Neel Chauhan.
- Merge functions used for describing nodes and suppress the
functions that do not allocate memory for the output buffer
string. NODE_DESC_BUF_LEN constant and format_node_description()
function cannot be used externally from router.c module anymore.
Closes ticket 25432. Patch by valentecaio.
- Our main loop has been simplified so that all important operations
happen inside events. Previously, some operations had to happen
outside the event loop, to prevent infinite sequences of event
activations. Closes ticket 25374.
- Put a SHA1 public key digest in hs_service_intro_point_t, and use
it in register_intro_circ() and service_intro_point_new(). This
prevents the digest from being re-calculated each time. Closes
ticket 23107. Patch by Neel Chauhan.
- Refactor token-bucket implementations to use a common backend.
Closes ticket 25766.
- Remove extern declaration of stats_n_seconds_working variable from
main, protecting its accesses with get_uptime() and reset_uptime()
functions. Closes ticket 25081, patch by “valentecaio”.
- Remove our previous logic for "cached gettimeofday()" -- our
coarse monotonic timers are fast enough for this purpose, and far
less error-prone. Implements part of ticket 25927.
- Remove the return value for fascist_firewall_choose_address_base(),
and sister functions such as fascist_firewall_choose_address_node()
and fascist_firewall_choose_address_rs(). Also, while we're here,
initialize the ap argument as leaving it uninitialized can pose a
security hazard. Closes ticket 24734. Patch by Neel Chauhan.
- Rename two fields of connection_t struct. timestamp_lastwritten is
renamed to timestamp_last_write_allowed and timestamp_lastread is
renamed to timestamp_last_read_allowed. Closes ticket 24714, patch
by "valentecaio".
- Since Tor requires C99, remove our old workaround code for libc
implementations where free(NULL) doesn't work. Closes ticket 24484.
- Use our standard rate-limiting code to deal with excessive
libevent failures, rather than the hand-rolled logic we had
before. Closes ticket 26016.
- We remove the return value of node_get_prim_orport() and
node_get_prim_dirport(), and introduce node_get_prim_orport() in
node_ipv6_or_preferred() and node_ipv6_dir_preferred() in order to
check for a null address. Closes ticket 23873. Patch by
Neel Chauhan.
- We switch to should_record_bridge_info() in
geoip_note_client_seen() and options_need_geoip_info() instead of
accessing the configuration values directly. Fixes bug 25290;
bugfix on 0.2.1.6-alpha. Patch by Neel Chauhan.
o Deprecated features:
- As we are not recommending 0.2.5 anymore, we require relays that
once had an ed25519 key associated with their RSA key to always
have that key, instead of allowing them to drop back to a version
that didn't support ed25519. This means they need to use a new RSA
key if the want to downgrade to an older version of tor without
ed25519. Closes ticket 20522.
o Removed features:
- Directory authorities will no longer support voting according to
any consensus method before consensus method 25. This keeps
authorities compatible with all authorities running 0.2.9.8 and
later, and does not break any clients or relays. Implements ticket
24378 and proposal 290.
- The PortForwarding and PortForwardingHelper features have been
removed. The reasoning is, given that implementations of NAT
traversal protocols within common consumer grade routers are
frequently buggy, and that the target audience for a NAT punching
feature is a perhaps less-technically-inclined relay operator,
when the helper fails to setup traversal the problems are usually
deep, ugly, and very router specific, making them horrendously
impossible for technical support to reliable assist with, and thus
resulting in frustration all around. Unfortunately, relay
operators who would like to run relays behind NATs will need to
become more familiar with the port forwarding configurations on
their local router. Closes 25409.
- The TestingEnableTbEmptyEvent option has been removed. It was used
in testing simulations to measure how often connection buckets
were emptied, in order to improve our scheduling, but it has not
been actively used in years. Closes ticket 25760.
- The old "round-robin" circuit multiplexer (circuitmux)
implementation has been removed, along with a fairly large set of
code that existed to support it. It has not been the default
circuitmux since we introduced the "EWMA" circuitmux in 0.2.4.x,
but it still required an unreasonable amount of memory and CPU.
Closes ticket 25268.
For the past year, we have been collecting feedback on how we can make
Tor Browser work better for you.
Tor Browser 8.0, our first stable release based on Firefox 60 ESR, is
now available from the Tor Browser Project page [1] and also from our
distribution directory [2]. This release is all about users first.
1: https://www.torproject.org/download/download-easy.html
2: https://www.torproject.org/dist/torbrowser/8.0/
Tor Browser 8.0 comes with a series of user experience improvements that
address a set of long-term Tor Browser issues you’ve told us about. To
meet our users' needs, Tor Browser has a new user onboarding experience;
an updated landing page that follows our styleguide [3]; additional
language support; and new behaviors for bridge fetching, displaying a
circuit, and visiting .onion sites.
3: https://styleguide.torproject.org/
_New User Onboarding_
For the most part, using Tor is like using any other browser (and it is
based on Firefox), but there are some usage differences and cool things
happening behind the scenes that users should be aware of. Our new
onboarding experience aims to better let you know about unique aspects
of Tor Browser and how to maximize those for your best browsing experience.
[4][5]
4: https://extra.torproject.org/blog/2018-09-05-tor-browser-80/tb8-onboarding-…
5: https://extra.torproject.org/blog/2018-09-05-tor-browser-80/tb8-circuit-dis…
_Improved Bridge Fetching_
For users where Tor is blocked, we have previously offered a handful of
bridges in the browser to bypass censorship. But to receive additional
bridges, you had to send an email or visit a website, which posed a set
of problems. To simplify how you request bridges, we now have a new
bridge configuration flow when you when you launch Tor. Now all you
have to do is solve a captcha in Tor Launcher, and you’ll get a bridge
IP. We hope this simplification will allow more people to bypass
censorship and browse the internet freely and privately. [6]
6: https://extra.torproject.org/blog/2018-09-05-tor-browser-80/tb8-bridges-sma…
_Better Language Support_
Millions of people around the world use Tor, but not everyone has been
able to use Tor in their language. In Tor Browser 8, we’ve added
resources and support for nine previously unsupported languages: Catalan,
Irish, Indonesian, Icelandic, Norwegian, Danish, Hebrew, Swedish, and
Traditional Chinese.
Apart from those highlights, a number of other component and toolchains
got an update for this major release. In particular, we now ship Tor
0.3.3.9 with OpenSSL 1.0.2p and Libevent 2.1.8. Moreover, we switched
to the pure WebExtension version of NoScript (version 10.1.9.1) which
we still need to provide the security slider functionality. Additionally,
we start shipping 64bit builds for Windows users which should enhance
Tor Browser stability compared to the 32bit bundles.
Providing this many improvements for our users could only be possible
with collaboration between the Tor Browser team and Tor's UX team,
Community team, Services Admin team, and our volunteers. We would like
to thank everyone for working hard over the past year to bring all
these new features to our users.
_Known Issues_
We already collected a number of unresolved bugs since Tor Browser
7.5.6 and tagged them with our ff60-esr keyword [7] to keep them on our
radar. The most important ones are listed below:
7: https://trac.torproject.org/projects/tor/query?status=!closed&keywords=…
* WebGL is broken right now
* We disable Stylo on macOS due to reproducibility issues [8] we need
to investigate and fix. This will likely not get fixed for Tor Browser 8,
as we need some baking time on our nightly/alpha channel before we
are sure there are no reproducibility/stability regressions. The
tentative plan is to get it ready for Tor Browser 8.5.
8: https://trac.torproject.org/projects/tor/ticket/26475
Note: This release is signed with a new GPG subkey as the old one expired
a couple of days ago. You might need to refresh your copy of the public
part of the Tor Browser signing key before doing the verification. The
fingerprint of the new subkey is:
1107 75B5 D101 FB36 BC6C 911B EB77 4491 D9FF 06E2
_Give Feedback_
This is only the beginning of our efforts to put users first. If you
find a bug or have a suggestion for how we could improve this release,
please let us know [9].
9: https://trac.torproject.org/projects/tor/wiki/doc/community/HowToReportBugF…
_Changelog_
The full changelog since Tor Browser 7.5.6 is:
* All platforms
* Update Firefox to 60.2.0esr
* Update Tor to 0.3.3.9
* Update OpenSSL to 1.0.2p
* Update Libevent to 2.1.8
* Update Torbutton to 2.0.6
* Bug 26960: Implement new about:tor start page
* Bug 26961: Implement new user onboarding
* Bug 26962: Circuit display onboarding
* Bug 27301: Improve about:tor behavior and appearance
* Bug 27214: Improve the onboarding text
* Bug 26321: Move 'New Identity', 'New Circuit' to File, hamburger menus
* Bug 26100: Adapt Torbutton to Firefox 60 ESR
* Bug 26520: Fix sec slider/NoScript for TOR_SKIP_LAUNCH=1
* Bug 27401: Start listening for NoScript before it loads
* Bug 26430: New Torbutton icon
* Bug 24309: Move circuit display to the identity popup
* Bug 26884: Use Torbutton to provide security slider on mobile
* Bug 26128: Adapt security slider to the WebExtensions version of NoScript
* Bug 27276: Adapt to new NoScript messaging protocol
* Bug 23247: Show security state of .onions
* Bug 26129: Show our about:tor page on startup
* Bug 26235: Hide new unusable items from help menu
* Bug 26058: Remove workaround for hiding 'sign in to sync' button
* Bug 26590: Use new svg.disabled pref in security slider
* Bug 26655: Adjust color and size of onion button
* Bug 26500: Reposition circuit display relay icon for RTL locales
* Bug 26409: Remove spoofed locale implementation
* Bug 26189: Remove content-policy.js
* Bug 26544: Images are not centered anymore
* Bug 26490: Remove the security slider notification
* Bug 25126: Make about:tor layout responsive
* Bug 27097: Add text for Tor News signup widget
* Bug 21245: Add da translation to Torbutton and keep track of it
* Bug 27129+20628: Add locales ca, ga, id, is, nb, da, he, sv, and zh-TW
* Translations update
* Update Tor Launcher to 0.2.16.3
* Bug 23136: Moat integration (fetch bridges for the user)
* Bug 25750: Update Tor Launcher to make it compatible with Firefox 60 ESR
* Bug 26985: Help button icons missing
* Bug 25509: Improve the proxy help text
* Bug 26466: Remove sv-SE from tracking for releases
* Bug 27129+20628: Add locales ca, ga, id, is, nb, da, he, sv, and zh-TW
* Translations update
* Update HTTPS Everywhere to 2018.8.22
* Update NoScript to 10.1.9.1
* Update meek to 0.31
* Bug 26477: Make meek extension compatible with ESR 60
* Update obfs4proxy to v0.0.7 (bug 25356)
* Bug 27082: Enable a limited UITour for user onboarding
* Bug 26961: New user onboarding
* Bug 26962: New feature onboarding
* Bug 27403: The onboarding bubble is not always displayed
* Bug 27283: Fix first-party isolation for UI tour
* Bug 27213: Update about:tbupdate to new (about:tor) layout
* Bug 14952+24553: Enable HTTP2 and AltSvc
* Bug 25735: Tor Browser stalls while loading Facebook login page
* Bug 17252: Enable TLS session identifiers with first-party isolation
* Bug 26353: Prevent speculative connects that violate first-party isolation
* Bug 26670: Make canvas permission prompt respect first-party isolation
* Bug 24056: Use en-US strings in HTML forms if locale is spoofed to english
* Bug 26456: HTTP .onion sites inherit previous page's certificate information
* Bug 26561: .onion images are not displayed
* Bug 26321: Move 'New Identity', 'New Circuit' to File, hamburger menus
* Bug 26833: Backport Mozilla's bug 1473247
* Bug 26628: Backport Mozilla's bug 1470156
* Bug 26237: Clean up toolbar for ESR60-based Tor Browser
* Bug 26519: Avoid Firefox icons in ESR60
* Bug 26039: Load our preferences that modify extensions (fixup)
* Bug 26515: Update Tor Browser blog post URLs
* Bug 26216: Fix broken MAR file generation
* Bug 26409: Remove spoofed locale implementation
* Bug 25543: Rebase Tor Browser patches for ESR60
* Bug 23247: Show security state of .onions
* Bug 26039: Load our preferences that modify extensions
* Bug 17965: Isolate HPKP and HSTS to URL bar domain
* Bug 21787: Spoof en-US for date picker
* Bug 21607: Disable WebVR for now until it is properly audited
* Bug 21549: Disable wasm for now until it is properly audited
* Bug 26614: Disable Web Authentication API until it is properly audited
* Bug 27281: Enable Reader View mode again
* Bug 26114: Don't expose navigator.mozAddonManager to websites
* Bug 21850: Update about:tbupdate handling for e10s
* Bug 26048: Fix potentially confusing "restart to update" message
* Bug 27221: Purge startup cache if Tor Browser version changed
* Bug 26049: Reduce delay for showing update prompt to 1 hour
* Bug 26365: Add potential AltSvc support
* Bug 9145: Fix broken hardware acceleration on Windows and enable it
* Bug 26045: Add new MAR signing keys
* Bug 25215: Revert bug 18619 (we are not disabling IndexedDB any longer)
* Bug 19910: Rip out optimistic data socks handshake variant (#3875)
* Bug 22564: Hide Firefox Sync
* Bug 25090: Disable updater telemetry
* Bug 26127: Make sure Torbutton and Tor Launcher are not treated as legacy extensions
* Bug 13575: Disable randomised Firefox HTTP cache decay user tests
* Bug 22548: Firefox downgrades VP9 videos to VP8 for some users
* Bug 24995: Include git hash in tor --version
* Bug 27268+27257+27262+26603 : Preferences clean-up
* Bug 26073: Migrate general.useragent.locale to intl.locale.requested
* Bug 27129+20628: Make Tor Browser available in ca, ga, id, is, nb, da, he, sv, and zh-TW
* Bug 12927: Include Hebrew translation into Tor Browser
* Bug 21245: Add danish (da) translation
* Windows
* Bug 20636+10026: Create 64bit Tor Browser for Windows
* Bug 26239+24197: Enable content sandboxing for 64bit Windows builds
* Bug 26514: Fix intermittent updater failures on Win64 (Error 19)
* Bug 26874: Fix UNC path restrictions failure in Tor Browser 8.0a9
* Bug 12968: Enable HEASLR in Windows x86_64 builds
* Bug 26381: Work around endless loop during page load and about:tor not loading
* Bug 27411: Fix broken security slider and NoScript interaction on Windows
* Bug 22581: Fix shutdown crash
* Bug 25266: PT config should include full names of executable files
* Bug 26304: Update zlib to version 1.2.11
* Update tbb-windows-installer to 0.4
* Bug 26355: Update tbb-windows-installer to check for Windows7+
* Bug 26355: Require Windows7+ for updates to Tor Browser 8
* OS X
* Bug 24136: After loading file:// URLs clicking on links is broken on OS X
* Bug 24243: Tor Browser only renders HTML for local pages via file://
* Bug 24263: Tor Browser does not run extension scripts if loaded via about:debugging
* Bug 22794: Don't open AF_INET/AF_INET6 sockets when AF_LOCAL is configured
* Linux
* Bug 22794: Don't open AF_INET/AF_INET6 sockets when AF_LOCAL is configured
* Bug 25485: Unbreak Tor Browser on systems with newer libstdc++
* Bug 20866: Fix OpenGL software rendering on systems with newer libstdc++
* Bug 26951+18022: Fix execdesktop argument passing
* Bug 24136: After loading file:// URLs clicking on links is broken on Linux
* Bug 24243: Tor Browser only renders HTML for local pages via file://
* Bug 24263: Tor Browser does not run extension scripts if loaded via about:debugging
* Bug 20283: Tor Browser should run without a `/proc` filesystem.
* Bug 26354: Set SSE2 support as minimal requirement for Tor Browser 8
* Build System
* All
* Bug 26362+26410: Use old MAR format for first ESR60-based stable
* Bug 27020: RBM build fails with runc version 1.0.1
* Bug 26949: Use GitHub repository for STIX
* Bug 26773: Add --verbose to the ./mach build flag for firefox
* Bug 26319: Don't package up Tor Browser in the `mach package` step
* Bug 27178: add support for xz compression in mar files
* Clean up
* Windows
* Bug 26203: Adapt tor-browser-build/tor-browser for Windows
* Bug 26204: Bundle d3dcompiler_47.dll for Tor Browser 8
* Bug 26205: Don't build the uninstaller for Windows during Firefox compilation
* Bug 26206: Ship pthread related dll where needed
* Bug 26396: Build libwinpthread reproducible
* Bug 25837: Integrate fxc2 into our build setup for Windows builds
* Bug 27152: Use mozilla/fxc2.git for the fxc2 repository
* Bug 25894: Get a rust cross-compiler for Windows
* Bug 25554: Bump mingw-w64 version for ESR 60
* Bug 23561: Fix nsis builds for Windows 64
* Bug 13469: Windows installer is missing many languages from NSIS file
* Bug 23231: Remove our STL Wrappers workaround for Windows 64bit
* Bug 26370: Don't copy msvcr100.dll and libssp-0.dll twice
* Bug 26476: Work around Tor Browser crashes due to fix for bug 1467041
* Bug 18287: Use SHA-2 signature for Tor Browser setup executables
* Bug 25420: Update GCC to 6.4.0
* Bug 16472: Update Binutils to 2.26.1
* Bug 20302: Fix FTE compilation for Windows with GCC 6.4.0
* Bug 25111: Don't compile Yasm on our own anymore for Windows Tor Browser
* Bug 18691: Switch Windows builds from precise to jessie
* OS X
* Bug 24632: Update macOS toolchain for ESR 60
* Bug 9711: Build our own cctools for macOS cross-compilation
* Bug 25548: Update macOS SDK for Tor Browser builds to 10.11
* Bug 26003: Clean up our mozconfig-osx-x86_64 file
* Bug 26195: Use new cctools in our macosx-toolchain project
* Bug 25975: Get a rust cross-compiler for macOS
* Bug 26475: Disable Stylo to make macOS build reproducible
* Bug 26489: Fix .app directory name in tools/dmg2mar
* Linux
* Bug 26073: Patch tor-browser-build for transition to ESR 60
* Bug 25481: Rust support for tor-browser and tor
* Bug 25304: Update GCC to 6.4.0
* Bug 16472: Update Binutils to 2.26.1