Tor Weekly News — May 14th, 2014

Lunar lunar at
Wed May 14 12:05:24 UTC 2014

Tor Weekly News                                           May 14th, 2014

Welcome to the nineteenth issue of Tor Weekly News in 2014, the weekly
newsletter that covers what is happening in the Tor community.

Tor Browser 3.6.1 is released

On May 7th, version 3.6.1 of the Tor Browser was released [1]. Apart
from updating HTTPS Everywhere and NoScript, the new release mainly
solves a regression experienced by proxy users [2].

The new version should not error out with “You have configured more than
one proxy type” anymore.


More monthly status reports for April 2014

More monthly reports from Tor project members have arrived this week
with submissions from Nicolas Vigier [3] and Roger Dingledine [4].

Roger also sent the report for SponsorF [5]. The Tails team has released
theirs [6].


Miscellaneous news

ooniprobe 1.0.2 has been released [7]. The new version brings security
fixes, a manpage, a test for Tor bridge reachability among other


As the Tor blog should migrate away from its current decaying
software [8], Eric Schaefer wrote [9] to tell that he had extracted all
blog posts in a format ready for a static site generator. Comments are
also available.  One option would be to import them in a dedicated
commenting system. Tom Purl has setup [10] a test Juvia instance for
anyone who wish to give it a shot.


David Fifield released [11] a new round of Tor Browser packages modified
to include meek [12]. “Unlike previous bundles […], these ones aren’t
configured to use meek automatically. You have to select ‘Configure’ on
the network settings screen and then choose meek from the list of
transports.” Please give them a try!


Isis Lovecruft rewrote [13] the email bridge distributor in order to fix
some fundamental design problems with the old code. Reviews are welcome.


Tor help desk roundup

A relay operator contacted the Tor Help Desk after seeing the following
message in the Tor log: “http status 400 ("Fingerprint is marked
rejected") response from dirserver ''”.

One might see this message is if one’s relay was found to be vulnerable
to the Heartbleed OpenSSL bug and subsequently removed from the Tor
consensus. Instructions for upgrading one’s relay [14] are on the Tor
project’s blog.


Upcoming events

May 14 19:00 UTC | little-t tor development meeting
                 | #tor-dev,
May 16 15:00 UTC | Tor Browser online meeting
                 | #tor-dev,
May 18-21        | 35th IEEE Symposium on Security and Privacy
                 | San Jose, California, USA
May 27-28        | Tor @ Stockholm Internet Forum
                 | Stockholm, Sweden

This issue of Tor Weekly News has been assembled by Lunar,
Matt Pagan, Karsten Loesing and Roger Dingledine.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [15], write down your
name and subscribe to the team mailing list [16] if you want to
get involved!

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <>

More information about the tor-news mailing list