[tor-talk] Tor Weekly News — November 26th, 2014

Harmony harmony01 at riseup.net
Wed Nov 26 15:09:42 UTC 2014

Tor Weekly News                                      November 26th, 2014

Welcome to the forty-seventh issue in 2014 of Tor Weekly News, the
weekly newsletter that covers what’s happening in the Tor community.

A new Tor directory authority

Tor, being free software, can be used by anyone to set up their own
anonymity network, as Tom Ritter demonstrated last month [1]; but “the
Tor network” as we know it today consists of the 6500+ relays voted on
by nine “directory authorities” (or “dirauths”) [2], operated by trusted
members of the Tor development team and community [3].

As Mike Perry, a longtime directory authority operator, wished to retire
his machine, “turtles”, without unbalancing the number of authorities
producing the consensus [4], a new authority named “longclaw” [5] was
brought online by the autonomous tech collective Riseup [6], which has
been offering free and secure methods of communication (most of them now
available as hidden services [7]) since 1999.

Thanks to Riseup for playing this key role in the operation of the Tor

  [1]: https://lists.torproject.org/pipermail/tor-dev/2014-October/007613.html
  [2]: https://gitweb.torproject.org/tor.git/blob/HEAD:/src/or/config.c#l823
  [3]: https://www.torproject.org/docs/faq#KeyManagement
  [4]: https://metrics.torproject.org/about.html#consensus
  [5]: https://en.wikipedia.org/wiki/Longclaw
  [6]: https://help.riseup.net/
  [7]: https://help.riseup.net/en/security/network-security/tor#riseups-tor-hidden-services

Miscellaneous news

Nathan Freitas announced [8] the release of Orbot 14.1.3, which includes
improved handling of background processes; it builds on the earlier
14.1.0 [9], which brought with it support for Android 5.0 Lollipop, as
well as stability fixes. Orweb was brought up to version 0.7, also
introducing support for the new Android release.

  [8]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-November/004068.html
  [9]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-November/004036.html

George Kadianakis sent out [10] a co-authored draft of a proposal for
statistics concerning hidden service activity that relays could collect
and publish without harming the anonymity or security of users and
hidden services, and which might “be useful to Tor developers and to
people who want to understand hidden services and the onionspace

 [10]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007863.html

Tom Ritter drafted a proposal [11] exploring methods a hidden service
operator might use to prove to certificate authorities that they control
the service’s private key when requesting SSL certificates.

 [11]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007853.html

Karsten Loesing spruced up [12] the documentation on the Tor Metrics
portal [13], including a handy glossary of frequently-used Tor-specific
terms [14].

 [12]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007834.html
 [13]: https://metrics.torproject.org/
 [14]: https://metrics.torproject.org/about.html

Damian Johnson sketched out a roadmap [15] for further development of
Stem [16], the Tor controller library in Python, welcoming “more general
ideas on directions to take Stem, the tor-prompt, and this whole space”.

 [15]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007831.html
 [16]: https://stem.torproject.org/

Andrew Lewman reported [17] on his experiments in mirroring the Tor
Project website using the Fastly CDN as well as the BitTorrent Sync

 [17]: https://lists.torproject.org/pipermail/tor-mirrors/2014-November/000781.html

Following a suggestion [18] that a guide to server hardening should be
distributed with the tor software package, Libertas drafted [19] a
sample document and asked for reviews. “Please share any opinions or
contributions you have. This was written in a little more than an hour,
so it’s still a work in progress.”

 [18]: https://bugs.torproject.org/13703
 [19]: https://lists.torproject.org/pipermail/tor-relays/2014-November/005846.html

Libertas also scanned [20] a large number of currently-running Tor
relays to check which ssh access authentication methods their servers
supported, finding 2051 relays that still permitted password-based ssh
authentication. “Generally, it is far more secure to allow only public
key auth. The Ubuntu help pages have a good guide [21] on setting up
key-based auth”.

 [20]: https://lists.torproject.org/pipermail/tor-relays/2014-November/005759.html
 [21]: https://help.ubuntu.com/community/SSH/OpenSSH/Keys

SiNA Rabbani noted [22] that a large proportion of Tor exit relays are
located in Europe, and called for relay operators to consider running
nodes with US hosts. “I am not sure if the reason is lack of
Tor-friendly ISPs or people are just too freaked out about the summer of
Snowden. I think it’s very wrong to assume that EU countries are not
part of the world-wide-wiretap, packets are going through a few internet
exchanges anyways.”

 [22]: https://lists.torproject.org/pipermail/tor-relays/2014-November/005806.html

Thanks to Andy Weber [23], Matt Kraai [24], Alexander Dietrich [25],
James Murphy [26], Jesse Victors [27], Lucid Networks [28],
mirror-server.de [29], NTU Open Source Society [30], and Justaguy [31]
for running mirrors of the Tor Project’s website and software!

 [23]: https://lists.torproject.org/pipermail/tor-mirrors/2014-October/000738.html
 [24]: https://lists.torproject.org/pipermail/tor-mirrors/2014-October/000741.html
 [25]: https://lists.torproject.org/pipermail/tor-mirrors/2014-October/000746.html
 [26]: https://lists.torproject.org/pipermail/tor-mirrors/2014-October/000751.html
 [27]: https://lists.torproject.org/pipermail/tor-mirrors/2014-November/000763.html
 [28]: https://lists.torproject.org/pipermail/tor-mirrors/2014-November/000783.html
 [29]: https://lists.torproject.org/pipermail/tor-mirrors/2014-November/000784.html
 [30]: https://lists.torproject.org/pipermail/tor-mirrors/2014-November/000762.html
 [31]: https://lists.torproject.org/pipermail/tor-mirrors/2014-November/000764.html

Tor help desk roundup

The help desk commonly sees questions from users who get error messages
when using Vidalia, the graphical Tor controller. Vidalia is
unmaintained and many of its features simply do not work any more, so it
has been deprecated [32]. For web browsing, only the latest version of
Tor Browser [33] should be used. If you were trying to use the (now
also defunct) Vidalia Bridge or Relay Bundles, documentation for how to
set up bridges [34] and regular relays [35] more effectively without
Vidalia can be found on the website.

 [32]: https://www.torproject.org/docs/faq.html#WhereDidVidaliaGo
 [33]: https://www.torproject.org/projects/torbrowser.html
 [34]: https://www.torproject.org/projects/obfsproxy-instructions
 [35]: https://www.torproject.org/docs/tor-relay-debian

Upcoming events

  Nov 26 13:30 UTC | little-t tor development meeting
                   | #tor-dev, irc.oftc.net
  Nov 26 16:00 UTC | Pluggable transports meeting
                   | #tor-dev, irc.oftc.net
  Dec 01 18:00 UTC | Tor Browser online meeting
                   | #tor-dev, irc.oftc.net
  Dec 01 18:00 UTC | OONI development meeting
                   | #ooni, irc.oftc.net
                   | https://lists.torproject.org/pipermail/tor-dev/2014-November/007852.html
  Dec 02 17:00 UTC | little-t tor patch workshop
                   | #tor-dev, irc.oftc.net
  Dec 03 20:00 UTC | Tails contributors meeting
                   | #tails-dev, irc.oftc.net
                   | https://mailman.boum.org/pipermail/tails-dev/2014-November/007418.html

This issue of Tor Weekly News has been assembled by Harmony, Matt Pagan,
Roger Dingledine, and Karsten Loesing.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [36], write down your
name and subscribe to the team mailing list [37] if you want to
get involved!

 [36]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
 [37]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

More information about the tor-talk mailing list