[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Sep 30 15:40:09 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/39 ===
===========================================================================
version 26
Author: harmony
Date: 2014-09-30T15:02:04+00:00
take out unnecessary link
--- version 25
+++ version 26
@@ -130,16 +130,14 @@
their use on the Tor network, Roger Dingledine asked [XXX] relay
operators who are “comfortable compiling Tor from git” and who “want to
help investigate what fraction of Tor network load comes from hidden
-service use” to check out the new hs-stats git branch [XXX]. This
-version “will collect per-thirty-minute statistics about number of
-circuits and number of cells your relay sees that have to do with
-exiting, with hidden services, with circuits where you're not the final
-hop, and a fourth none-of-the-above category”, which can then be posted
-to the appropriate ticket on the bug tracker [XXX] or sent to Roger
-directly.
+service use” to check out the new hs-stats git branch. This version
+“will collect per-thirty-minute statistics about number of circuits and
+number of cells your relay sees that have to do with exiting, with hidden
+services, with circuits where you're not the final hop, and a fourth
+none-of-the-above category”, which can then be posted to the appropriate
+ticket on the bug tracker [XXX] or sent to Roger directly.
[XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-September/005352.html
- [XXX]: https://gitweb.torproject.org/arma/tor.git/shortlog/refs/heads/hs-stats
[XXX]: https://bugs.torproject.org/13192
Yawning Angel sent [XXX] a “friendly reminder” to ScrambleSuit bridge
version 25
Author: harmony
Date: 2014-09-30T14:58:03+00:00
write about hs-stats
--- version 24
+++ version 25
@@ -126,6 +126,22 @@
[XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-September/034950.html
+As part of the current push to better understand hidden services and
+their use on the Tor network, Roger Dingledine asked [XXX] relay
+operators who are “comfortable compiling Tor from git” and who “want to
+help investigate what fraction of Tor network load comes from hidden
+service use” to check out the new hs-stats git branch [XXX]. This
+version “will collect per-thirty-minute statistics about number of
+circuits and number of cells your relay sees that have to do with
+exiting, with hidden services, with circuits where you're not the final
+hop, and a fourth none-of-the-above category”, which can then be posted
+to the appropriate ticket on the bug tracker [XXX] or sent to Roger
+directly.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-September/005352.html
+ [XXX]: https://gitweb.torproject.org/arma/tor.git/shortlog/refs/heads/hs-stats
+ [XXX]: https://bugs.torproject.org/13192
+
Yawning Angel sent [XXX] a “friendly reminder” to ScrambleSuit bridge
operators, asking them to upgrade to tor-0.2.5.x if they haven’t
already: “If you are running a ScrambleSuit bridge with tor-0.2.4.x, it
@@ -178,5 +194,4 @@
Possible items:
* Attack linking Tor circuits https://lists.torproject.org/pipermail/tor-dev/2014-September/thread.html#7489
* Estimating the value and cost of the Tor network https://lists.torproject.org/pipermail/tor-relays/2014-September/005335.html
- * Hidden service usage stats https://lists.torproject.org/pipermail/tor-relays/2014-September/005352.html
* Scaling tor for a global population (few new users?) https://lists.torproject.org/pipermail/tor-dev/2014-September/007533.html
version 24
Author: harmony
Date: 2014-09-30T14:36:23+00:00
clarify
--- version 23
+++ version 24
@@ -41,17 +41,17 @@
Mike Perry announced two new releases by the Tor Browser team. Tor
Browser 3.6.6 [XXX] includes a workaround for the bug [XXX] that has
-been preventing the browser window from opening after an apparently
-successful connection to the Tor network; it also stops intermediate SSL
-certificates from being written to disk. In addition to these fixes, Tor
-Browser 4.0-alpha-3 [XXX] resolves a number of issues to do with the
-upcoming Tor Browser updater, including the mistaken upgrade of
-non-English Tor Browsers to the English-language version. As this bug is
-only fixed in the new release, users upgrading from 4.0-alpha-2 will
-still experience this issue during the process. Furthermore, “meek
-transport users will need to restart their browser a second time after
-upgrade if they use the in-browser updater. We are still trying to get
-to the bottom of this issue [XXX]”, wrote Mike.
+sometimes been preventing the browser window from opening after an
+apparently successful connection to the Tor network; it also stops
+intermediate SSL certificates from being written to disk. In addition to
+these fixes, Tor Browser 4.0-alpha-3 [XXX] resolves a number of issues
+to do with the upcoming Tor Browser updater, including the mistaken
+upgrade of non-English Tor Browsers to the English-language version. As
+this bug is only fixed in the new release, users upgrading from
+4.0-alpha-2 will still experience this issue during the process.
+Furthermore, “meek transport users will need to restart their browser a
+second time after upgrade if they use the in-browser updater. We are still
+trying to get to the bottom of this issue [XXX]”, wrote Mike.
Both releases also include important Firefox security updates, so all
users should upgrade as soon as possible. See Mike’s announcements for
version 23
Author: harmony
Date: 2014-09-30T13:52:45+00:00
remove unused sections
--- version 22
+++ version 23
@@ -10,7 +10,7 @@
========================================================================
Welcome to the thirty-ninth issue in 2014 of Tor Weekly News, the weekly
-newsletter that covers what is happening in the XXX Tor community.
+newsletter that covers what’s happening in the Tor community.
Tor 0.2.4.24 and 0.2.5.8-rc are out
-----------------------------------
@@ -134,11 +134,6 @@
[XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-September/005344.html
-Tor help desk roundup
----------------------
-
-Summary of some questions sent to the Tor help desk.
-
News from Tor StackExchange
---------------------------
@@ -154,13 +149,6 @@
the Q&A page.
[XXX]: https://tor.stackexchange.com/q/4192/88
-
-Easy development tasks to get involved with
--------------------------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
Upcoming events
---------------
version 22
Author: harmony
Date: 2014-09-30T13:49:40+00:00
write about obfs4
--- version 21
+++ version 22
@@ -84,6 +84,38 @@
[XXX]: https://tails.boum.org/news/version_1.1.2/
[XXX]: https://tails.boum.org/download/index
+obfs4 is ready for general deployment; bridge operators needed!
+---------------------------------------------------------------
+
+Pluggable transports [XXX], the circumvention techniques which allow
+users to access the Tor network from censored areas by disguising the
+fact that the Tor protocol is being used, are about to take another step
+forward with the release of obfs4, and Yawning Angel sent out [XXX] a
+brief discussion of this new protocol.
+
+obfs4 offers a number of developments over the obfs3 and ScrambleSuit
+protocols, until now the most sophisticated pluggable transports in use
+on the Tor network. Like ScrambleSuit, obfs4 improves on obfs3 to
+“provide resilience against active attackers and to disguise flow
+signatures” [XXX], while a safer and more efficient key-exchange process
+than ScrambleSuit’s should make it impossible for attackers to launch
+man-in-the-middle attacks based on the client/bridge shared secret.
+
+Like its predecessors in the obfsproxy series, obfs4 is a bridge-based
+transport, meaning that volunteers are needed to operate relays running
+an implementation of the new protocol before users can take advantage of
+it. The current implementation, obfs4proxy, is now available to download
+either as source code [XXX] or as a package from Debian’s unstable
+repositories [XXX]. If you’re willing to run an obfs4 bridge, please see
+Yawning’s message for all the relevant details — “questions, comments,
+and bridges appreciated”!
+
+ [XXX]: https://www.torproject.org/docs/pluggable-transports
+ [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-September/005372.html
+ [XXX]: https://gitweb.torproject.org/pluggable-transports/obfs4.git/blob/refs/heads/master:/doc/obfs4-spec.txt
+ [XXX]: https://gitweb.torproject.org/pluggable-transports/obfs4.git
+ [XXX]: https://packages.debian.org/sid/obfs4proxy
+
Miscellaneous news
------------------
@@ -159,5 +191,4 @@
* Attack linking Tor circuits https://lists.torproject.org/pipermail/tor-dev/2014-September/thread.html#7489
* Estimating the value and cost of the Tor network https://lists.torproject.org/pipermail/tor-relays/2014-September/005335.html
* Hidden service usage stats https://lists.torproject.org/pipermail/tor-relays/2014-September/005352.html
- * Call for obfs4 bridges, and a brief discussion of obfs4proxy https://lists.torproject.org/pipermail/tor-relays/2014-September/005372.html
* Scaling tor for a global population (few new users?) https://lists.torproject.org/pipermail/tor-dev/2014-September/007533.html
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list