Hi everyone,
Tor Browser 12.0.5 has now been published for all platforms. For details please
see our blog post:
- https://blog.torproject.org/new-release-tor-browser-1205/
One thing to take note for this release: our build-signing infrastructure is in
the middle of being updated and unfortunately we do not have Windows
code-signing working at the moment. Therefore, we are not publishing executable
Windows installers for this release on the https://torproject.org website.
However, build-to-build upgrades are fully signed and working, so Windows users
may install 12.0.4 and be automatically updated to 12.0.5.
best,
-Richard
Greetings,
We have just released 2 new stable (0.4.5 and 0.4.7 series).
Announcement: https://forum.torproject.net/t/stable-release-0-4-5-16-and-0-4-7-13/6216
ChangeLog for both are below.
Cheers!
David
Changes in version 0.4.7.13 - 2023-01-12
This version contains three major bugfixes, two for relays and one for
client being a security fix, TROVE-2022-002. We have added, for Linux, the
support for IP_BIND_ADDRESS_NO_PORT for relays using OutboundBindAddress.
We strongly recommend to upgrade to this version considering the important
congestion control fix detailed below.
o Major bugfixes (congestion control):
- Avoid incrementing the congestion window when the window is not
fully in use. Thia prevents overshoot in cases where long periods
of low activity would allow our congestion window to grow, and
then get followed by a burst, which would cause queue overload.
Also improve the increment checks for RFC3742. Fixes bug 40732;
bugfix on 0.4.7.5-alpha.
o Major bugfixes (relay):
- When opening a channel because of a circuit request that did not
include an Ed25519 identity, record the Ed25519 identity that we
actually received, so that we can use the channel for other
circuit requests that _do_ list an Ed25519 identity. (Previously
we had code to record this identity, but a logic bug caused it to
be disabled.) Fixes bug 40563; bugfix on 0.3.0.1-alpha. Patch
from "cypherpunks".
o Major bugfixes (TROVE-2022-002, client):
- The SafeSocks option had its logic inverted for SOCKS4 and
SOCKS4a. It would let the unsafe SOCKS4 pass but not the safe
SOCKS4a one. This is TROVE-2022-002 which was reported on
Hackerone by "cojabo". Fixes bug 40730; bugfix on 0.3.5.1-alpha.
o Minor feature (authority):
- Reject 0.4.6.x series at the authority level. Closes ticket 40664.
o Minor features (fallbackdir):
- Regenerate fallback directories generated on January 12, 2023.
o Minor features (geoip data):
- Update the geoip files to match the IPFire Location Database, as
retrieved on 2023/01/12.
o Minor features (relays):
- Set the Linux-specific IP_BIND_ADDRESS_NO_PORT option on outgoing
sockets, allowing relays using OutboundBindAddress to make more
outgoing connections than ephemeral ports, as long as they are to
separate destinations. Related to issue 40597; patch by Alex
Xu (Hello71).
o Minor bugfixes (relay, metrics):
- Fix typo in a congestion control label on the MetricsPort. Fixes
bug 40727; bugfix on 0.4.7.12.
o Minor bugfixes (sandbox, authority):
- With the sandbox enabled, allow to write "my-consensus-
{ns|microdesc}" and to rename them as well. Fixes bug 40729;
bugfix on 0.3.5.1-alpha.
o Code simplifications and refactoring:
- Rely on actual error returned by the kernel when choosing what
resource exhaustion to log. Fixes issue 40613; Fix
on tor-0.4.6.1-alpha.
Changes in version 0.4.5.16 - 2023-01-12
This version has one major bugfix for relay and a security fix,
TROVE-2022-002, affecting clients. We strongly recommend to upgrade to our
0.4.7.x stable series. As a reminder, this series is EOL on February 15th,
2023.
o Major bugfixes (relay):
- When opening a channel because of a circuit request that did not
include an Ed25519 identity, record the Ed25519 identity that we
actually received, so that we can use the channel for other
circuit requests that _do_ list an Ed25519 identity. (Previously
we had code to record this identity, but a logic bug caused it to
be disabled.) Fixes bug 40563; bugfix on 0.3.0.1-alpha. Patch
from "cypherpunks".
o Major bugfixes (TROVE-2022-002, client):
- The SafeSocks option had its logic inverted for SOCKS4 and
SOCKS4a. It would let the unsafe SOCKS4 pass but not the safe
SOCKS4a one. This is TROVE-2022-002 which was reported on
Hackerone by "cojabo". Fixes bug 40730; bugfix on 0.3.5.1-alpha.
o Minor features (fallbackdir):
- Regenerate fallback directories generated on January 12, 2023.
o Minor features (geoip data):
- Update the geoip files to match the IPFire Location Database, as
retrieved on 2023/01/12.
--
1OrP8sn2y9Ai/o7jdiO6vewB/8m4MqaDuwjSAzEgM04=
Hello everyone,
Tor Browser 12.0.1 is now available from the Tor Browser download page
<https://www.torproject.org/download/> and also from our distribution
directory <https://dist.torproject.org/torbrowser/12.0.1/>.
This release updates Firefox to 102.6, including bug fixes, stability
improvements and important security updates
<https://www.mozilla.org/en-US/security/advisories/mfsa2022-52/>.
We've fixed a regression in our drag and drop protection, whose
hardening disrupted some interface interactions, and most notably
rearranging bookmarks by dragging them around.
We'd like to thank poncho for fixing another regression causing the
|TOR_SOCKS_IPC_PATH| environment variable to be ignored.
Blog post with changelog here
<https://blog.torproject.org/new-release-tor-browser-1201/>.
Have a nice weekend and a happy holiday season :)
--
ma1