[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon May 26 15:40:16 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/21 ===
===========================================================================

version 37
Author: lunar
Date:   2014-05-26T14:51:31+00:00

   write about moving descriptor archives out of metrics

--- version 36
+++ version 37
@@ -139,6 +139,11 @@
 
  [XXX]: https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer
  [XXX]: https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
+
+Karsten Loesing is planning on spinning off the directory archive
+from the metrics portal [XXX].
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html
 
 Tor help desk roundup
 ---------------------
@@ -201,5 +206,3 @@
 Possible items:
 
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
- * Spinning off Directory Archive from Metrics Portal https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html
-

version 36
Author: lunar
Date:   2014-05-26T14:47:08+00:00

   rework Onion Browser item

--- version 35
+++ version 36
@@ -66,15 +66,17 @@
  [XXX]: https://people.torproject.org/~lunar/tor-and-https/
  [XXX]: https://gitweb.torproject.org/user/lunar/tor-and-https.git/blob/HEAD:/tor-and-https.pot
 
-Cure53 released a report on the security of the Onion Browser, a web
+Cure53 audited the security [XXX] of the Onion Browser [XXX], a web
 browser for iOS platforms tunneling traffic through Tor. From the
 conclusion: “we believe that the Onion Browser project is on the right
 track, however there is still a long way ahead for the project to be
 appropriately ‘ripe’ for usage in actually privacy-relevant and
-critically important scenarios.”
-
- [XXX]: https://mike.tig.as/onionbrowser
+critically important scenarios.” All reported issues should have been
+fixed in release 1.5 [XXX], released May 14th.
+
  [XXX]: https://cure53.de/pentest-report_onion-browser.pdf
+ [XXX]: https://mike.tig.as/onionbrowser/
+ [XXX]: https://mike.tig.as/onionbrowser/security/#v1_5
 
 David Fifield published [XXX] “A Child’s Garden of Pluggable
 Transports” [XXX], a detailed visualization of different pluggable

version 35
Author: lunar
Date:   2014-05-26T14:40:28+00:00

   add link to blog post

--- version 34
+++ version 35
@@ -101,9 +101,10 @@
  [XXX]: https://github.com/Yawning/obfs4
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
 
-Stem now offers an interactive prompt to control Tor. Damian Johnson wrote
-a new tutorial [XXX]  to give an overview of what can be done with it.
-
+Stem now offers an interactive prompt to control Tor [XXX]. Damian Johnson
+wrote a new tutorial [XXX] to give an overview of what can be done with it.
+
+ [XXX]: https://blog.torproject.org/blog/new-feature-tor-interpreter
  [XXX]: https://stem.torproject.org/tutorials/down_the_rabbit_hole.html
 
 On the controller front, Yawning Angel also hacked on or-applet [XXX],

version 34
Author: lunar
Date:   2014-05-26T14:35:49+00:00

   write about ASan

--- version 33
+++ version 34
@@ -128,6 +128,14 @@
 
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-May/033032.html
  [XXX]: https://www.torproject.org/projects/obfsproxy-instructions.html
+
+AddressSanitizer [XXX] (ASan) is a powerful memory error detector. Software
+built with such technology makes it a lot hard to exploit programming error
+related to memory management. Georg Koppen has happily announced [XXX]
+the first test packages of the Tor Browser built with ASan hardening.
+
+ [XXX]: https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer
+ [XXX]: https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
 
 Tor help desk roundup
 ---------------------
@@ -189,7 +197,6 @@
 
 Possible items:
 
- * TBB built with Address Sanitizer  https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
  * Spinning off Directory Archive from Metrics Portal https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html
 

version 33
Author: lunar
Date:   2014-05-26T14:29:35+00:00

   reword item about Stem new control prompt

--- version 32
+++ version 33
@@ -101,9 +101,8 @@
  [XXX]: https://github.com/Yawning/obfs4
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
 
-Damian Johnson wrote a new tutorial [XXX] for the Stem controller
-library, giving an overview of Stem’s control prompt and Python
-interpreter, and what can be done with it.
+Stem now offers an interactive prompt to control Tor. Damian Johnson wrote
+a new tutorial [XXX]  to give an overview of what can be done with it.
 
  [XXX]: https://stem.torproject.org/tutorials/down_the_rabbit_hole.html
 
@@ -193,4 +192,4 @@
  * TBB built with Address Sanitizer  https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
  * Spinning off Directory Archive from Metrics Portal https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html
- * New Feature: Tor Interpreter https://lists.torproject.org/pipermail/tor-dev/2014-May/006910.html
+

version 32
Author: lunar
Date:   2014-05-26T14:26:27+00:00

   write about or-applet

--- version 31
+++ version 32
@@ -107,6 +107,11 @@
 
  [XXX]: https://stem.torproject.org/tutorials/down_the_rabbit_hole.html
 
+On the controller front, Yawning Angel also hacked on or-applet [XXX],
+a Gtk+ system tray applet to monitor Tor circuits.
+
+ [XXX]: https://github.com/yawning/or-applet
+
 Israel Leiva published [XXX] the initial version of a design
 proposal [XXX] for the “Revamp GetTor” Google Summer of Code project,
 having concluded that a full rewrite is needed.
@@ -185,7 +190,6 @@
 
 Possible items:
 
- * or-applet https://github.com/yawning/or-applet
  * TBB built with Address Sanitizer  https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
  * Spinning off Directory Archive from Metrics Portal https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html

version 31
Author: lunar
Date:   2014-05-26T14:21:31+00:00

   write about obfs4

--- version 30
+++ version 31
@@ -90,6 +90,17 @@
  [XXX]: https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
  [XXX]: https://www.torproject.org/docs/pluggable-transports
 
+A new pluggable transport, currently named obfs4 [XXX], is being crafted by
+Yawning Angel: “obfs4 is ScrambleSuit with djb crypto. Instead of obfs3 style
+UniformDH and CTR-AES256/HMAC-SHA256, obfs4 uses a combination of
+Curve25519, Elligator2, HMAC-SHA256, XSalsa20/Poly1305 and SipHash-2-4”.
+The feature set offered by obfs4 is comparable to ScrambleSuit with minor
+differences. Yawning is now asking the community for comments, reviews, and
+tests [XXX].
+
+ [XXX]: https://github.com/Yawning/obfs4
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
+
 Damian Johnson wrote a new tutorial [XXX] for the Stem controller
 library, giving an overview of Stem’s control prompt and Python
 interpreter, and what can be done with it.
@@ -174,7 +185,6 @@
 
 Possible items:
 
- * RFC: obfs4 https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
  * or-applet https://github.com/yawning/or-applet
  * TBB built with Address Sanitizer  https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533

version 30
Author: lunar
Date:   2014-05-26T13:56:42+00:00

   write about Sophos

--- version 29
+++ version 30
@@ -117,7 +117,12 @@
 Tor help desk roundup
 ---------------------
 
-Summary of some questions sent to the Tor help desk. 
+Multiple Mac OS X users complained that despite seeing the “Congratulations”
+welcome page, they were unable to reach any website with the Tor Browser.
+It appears that with a recent update, the Sophos anti-virus solution
+interferes with the Tor Browser. In order to be able to use the Tor Browser
+again, one must open Sophos Anti-Virus, then “Preferences” and in the
+“Web Protection” panel position all switches to off.
 
 News from Tor StackExchange
 ---------------------------

version 29
Author: lunar
Date:   2014-05-26T13:27:01+00:00

   write about cure53's report

--- version 28
+++ version 29
@@ -65,6 +65,16 @@
  [XXX]: https://www.eff.org/pages/tor-and-https/
  [XXX]: https://people.torproject.org/~lunar/tor-and-https/
  [XXX]: https://gitweb.torproject.org/user/lunar/tor-and-https.git/blob/HEAD:/tor-and-https.pot
+
+Cure53 released a report on the security of the Onion Browser, a web
+browser for iOS platforms tunneling traffic through Tor. From the
+conclusion: “we believe that the Onion Browser project is on the right
+track, however there is still a long way ahead for the project to be
+appropriately ‘ripe’ for usage in actually privacy-relevant and
+critically important scenarios.”
+
+ [XXX]: https://mike.tig.as/onionbrowser
+ [XXX]: https://cure53.de/pentest-report_onion-browser.pdf
 
 David Fifield published [XXX] “A Child’s Garden of Pluggable
 Transports” [XXX], a detailed visualization of different pluggable
@@ -165,4 +175,3 @@
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
  * Spinning off Directory Archive from Metrics Portal https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html
  * New Feature: Tor Interpreter https://lists.torproject.org/pipermail/tor-dev/2014-May/006910.html
- * cure53 report on Onion Browser https://cure53.de/pentest-report_onion-browser.pdf

version 28
Author: lunar
Date:   2014-05-26T13:03:02+00:00

   add item

--- version 27
+++ version 28
@@ -164,4 +164,5 @@
  * TBB built with Address Sanitizer  https://lists.torproject.org/pipermail/tor-qa/2014-May/000414.html
  * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
  * Spinning off Directory Archive from Metrics Portal https://lists.torproject.org/pipermail/tor-dev/2014-May/006909.html
- * New Feature: Tor Interpreter https://lists.torproject.org/pipermail/tor-dev/2014-May/006910.html
+ * New Feature: Tor Interpreter https://lists.torproject.org/pipermail/tor-dev/2014-May/006910.html
+ * cure53 report on Onion Browser https://cure53.de/pentest-report_onion-browser.pdf

version 27
Author: lunar
Date:   2014-05-26T12:41:26+00:00

   add event

--- version 26
+++ version 27
@@ -132,13 +132,17 @@
 Upcoming events
 ---------------
 
- May 28 19:00 UTC | little-t tor development meeting
-                  | #tor-dev, irc.oftc.net
-                  | https://lists.torproject.org/pipermail/tor-dev/2014-May/006888.html
-                  |
- May 30 15:00 UTC | Tor Browser online meeting
-                  | #tor-dev, irc.oftc.net
-                  | https://lists.torproject.org/pipermail/tbb-dev/2014-April/000049.html
+ May  28 19:00 UTC | little-t tor development meeting
+                   | #tor-dev, irc.oftc.net
+                   | https://lists.torproject.org/pipermail/tor-dev/2014-May/006888.html
+                   |
+ May  30 15:00 UTC | Tor Browser online meeting
+                   | #tor-dev, irc.oftc.net
+                   | https://lists.torproject.org/pipermail/tbb-dev/2014-April/000049.html
+                   |
+ June  6 17:30 EDT | Tails 1.0 Launch Party
+                   | Washington, DC, USA
+                   | http://tailslaunch.eventbrite.com/
 
 This issue of Tor Weekly News has been assembled by XXX, XXX, and
 XXX.



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list