Tor 0.1.1.26 fixes HttpProxyAuthenticator privacy flaw
arma at mit.edu
Sun Dec 17 07:37:48 UTC 2006
Tor 0.1.1.26 fixes a serious privacy bug for people who use the
HttpProxyAuthenticator config option: Tor would send your proxy auth
directly to the directory server when you're tunnelling directory
requests through Tor. Specifically, this happens when publishing or
accessing hidden services, or when you have set FascistFirewall or
ReachableAddresses and you're accessing a directory server that's not
The OS X stable bundles now also feature a new Vidalia version (0.0.9)
and a new Privoxy version (3.0.6).
If you use HttpProxyAuthenticator, we recommend you switch to 0.1.1.26
or stop using it for now. The upcoming 0.1.2.5-alpha (not yet finished)
will have this bugfix too. For people running 0.1.0.x who absolutely
cannot upgrade, here's your patch:
Changes in version 0.1.1.26 - 2006-12-14
o Security bugfixes:
- Stop sending the HttpProxyAuthenticator string to directory
servers when directory connections are tunnelled through Tor.
- Clients no longer store bandwidth history in the state file.
- Do not log introduction points for hidden services if SafeLogging
o Minor bugfixes:
- Fix an assert failure when a directory authority sets
AuthDirRejectUnlisted and then receives a descriptor from an
unlisted router (reported by seeess).
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 189 bytes
Desc: Digital signature
More information about the tor-announce