Autor Thema: Neue Tor-Version: sicherer und anonymer  (Gelesen 65313 mal)

0 Mitglieder und 3 Gäste betrachten dieses Thema.

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor 0.3.5.7, 0.3.4.10 & 0.3.3.11
« Antwort #405 am: 10 Januar, 2019, 21:30 »
Changelog

Tor 0.3.5.7 is the first stable release in its series; it includes compilation and portability fixes, and a fix for a severe problem affecting directory caches. Tor 0.3.4.10 and 0.3.3.11 are also released today; please see the official announcements for those releases if you are tracking older stable versions.

The Tor 0.3.5 series includes several new features and performance improvements, including client authorization for v3 onion services, cleanups to bootstrap reporting, support for improved bandwidth- measurement tools, experimental support for NSS in place of OpenSSL, and much more. It also begins a full reorganization of Tor's code layout, for improved modularity and maintainability in the future. Finally, there is the usual set of performance improvements and bugfixes that we try to do in every release series.

There are a couple of changes in the 0.3.5 that may affect compatibility. First, the default version for newly created onion services is now v3. Use the HiddenServiceVersion option if you want to override this. Second, some log messages related to bootstrapping have changed; if you use stem, you may need to update to the latest version so it will recognize them.

We have designated 0.3.5 as a "long-term support" (LTS) series: we will continue to patch major bugs in typical configurations of 0.3.5 until at least 1 Feb 2022. (We do not plan to provide long-term support for embedding, Rust support, NSS support, running a directory authority, or unsupported platforms. For these, you will need to stick with the latest stable release.)

Below are the changes since 0.3.5.6-rc. For a complete list of changes since 0.3.4.9, see the ReleaseNotes file.
Changes in version 0.3.5.7 - 2019-01-07

    Major bugfixes (relay, directory):
        Always reactivate linked connections in the main loop so long as any linked connection has been active. Previously, connections serving directory information wouldn't get reactivated after the first chunk of data was sent (usually 32KB), which would prevent clients from bootstrapping. Fixes bug 28912; bugfix on 0.3.4.1-alpha. Patch by "cypherpunks3".
    Minor features (compilation):
        When possible, place our warning flags in a separate file, to avoid flooding verbose build logs. Closes ticket 28924.

 

    Minor features (geoip):
        Update geoip and geoip6 to the January 3 2019 Maxmind GeoLite2 Country database. Closes ticket 29012.
    Minor features (OpenSSL bug workaround):
        Work around a bug in OpenSSL 1.1.1a, which prevented the TLS 1.3 key export function from handling long labels. When this bug is detected, Tor will disable TLS 1.3. We recommend upgrading to a version of OpenSSL without this bug when it becomes available. Closes ticket 28973.
    Minor features (performance):
        Remove about 96% of the work from the function that we run at startup to test our curve25519_basepoint implementation. Since this function has yet to find an actual failure, we now only run it for 8 iterations instead of 200. Based on our profile information, this change should save around 8% of our startup time on typical desktops, and may have a similar effect on other platforms. Closes ticket 28838.
        Stop re-validating our hardcoded Diffie-Hellman parameters on every startup. Doing this wasted time and cycles, especially on low-powered devices. Closes ticket 28851.
    Minor bugfixes (compilation):
        Fix compilation for Android by adding a missing header to freespace.c. Fixes bug 28974; bugfix on 0.3.5.1-alpha.
    Minor bugfixes (correctness):
        Fix an unreached code path where we checked the value of "hostname" inside send_resolved_hostname_cell(). Previously, we used it before checking it; now we check it first. Fixes bug 28879; bugfix on 0.1.2.7-alpha.
    Minor bugfixes (testing):
        Make sure that test_rebind.py actually obeys its timeout, even when it receives a large number of log messages. Fixes bug 28883; bugfix on 0.3.5.4-alpha.
        Stop running stem's unit tests as part of "make test-stem", but continue to run stem's unit and online tests during "make test- stem-full". Fixes bug 28568; bugfix on 0.2.6.3-alpha.
    Minor bugfixes (windows services):
        Make Tor start correctly as an NT service again: previously it was broken by refactoring. Fixes bug 28612; bugfix on 0.3.5.3-alpha.
    Code simplification and refactoring:
        When parsing a port configuration, make it more obvious to static analyzer tools that we always initialize the address. Closes ticket 28881.

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBeltPrivacy 8.2019.2 Beta
« Antwort #406 am: 26 Januar, 2019, 19:00 »
Whats new:>>

• Tor : ObfsProxy configuration updated. Defaults to Obfs4. Use Vidalia 'Bridges' link to
aquire more.
Tor updated to 0.3.5.7 with Libevent 2.1.8-stable, OpenSSL 1.0.2q, Zlib 1.2.11,
Liblzma 5.2.4, and Libzstd 1.3.5.
• WASTE : Updated to 1.8.0 Release. Build 062.0.0.0.
Reduce Anti-Spoof eagerness to notify.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
OnionShare 2.0 Dev 3
« Antwort #407 am: 28 Januar, 2019, 19:00 »
Changelog

New feature: Receiver mode allows you to receive files with OnionShare, instead of only sending files
New feature: macOS sandbox is enabled
New feature: Support for next generation onion services (TODO waiting on Tor release)
New feature: If you're sharing a single file, don't zip it up
New feature: Full support for meek_lite (Azure) bridges
New feature: Allow selecting your language from a dropdown
New translations: (TODO fill in for final release)
Several bugfixes
Invisible to users, but this version includes some major refactoring of the codebase, and a robust set of unit tests which makes OnionShare easier to maintain going forward

[close]

https://onionshare.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0.5
« Antwort #408 am: 29 Januar, 2019, 05:00 »
Changelog

 * All platforms
   * Update Firefox to 60.5.0esr
   * Update Tor to 0.3.5.7
   * Update Torbutton to 2.0.10
     * Bug 29035: Clean up our donation campaign and add newsletter sign-up link
     * Bug 27175: Add pref to allow users to persist custom noscript settings
   * Update HTTPS Everywhere to 2019.1.7
   * Update NoScript to 10.2.1
     * Bug 28873: Cascading of permissions is broken
     * Bug 28720: Some videos are blocked outright on higher security levels
   * Bug 26540: Enabling pdfjs disableRange option prevents pdfs from loading
   * Bug 28740: Adapt Windows navigator.platform value on 64-bit systems
   * Bug 28695: Set default security.pki.name_matching_mode to enforce (3)

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.5a7
« Antwort #409 am: 30 Januar, 2019, 18:00 »
Changelog

All Platforms

    Update Firefox to 60.5.0esr
    Update Torbutton to 2.1.4
        Bug 25702: Update Tor Browser icon to follow design guidelines
        Bug 21805: Add click-to-play button for WebGL
        Bug 28836: Links on about:tor are not clickable
        Bug 29035: Clean up our donation campaign and add newsletter sign-up link
        Translations update
        Code clean-up
    Update HTTPS Everywhere to 2019.1.7
    Update NoScript to 10.2.1
        Bug 28873: Cascading of permissions is broken
        Bug 28720: Some videos are blocked outright on higher security levels
    Bug 29082: Backport patches for bug 1469916
    Bug 28711: Backport patches for bug 1474659
    Bug 27828: "Check for Tor Browser update" doesn't seem to do anything
    Bug 29028: Auto-decline most canvas warning prompts again
    Bug 27597: Fix our debug builds

Windows

    Update Tor to 0.4.0.1-alpha
    Bug 25702: Activity 1.1 Update Tor Browser icon to follow design guidelines
    Bug 28111: Use Tor Browser icon in identity box
    Bug 22654: Firefox icon is shown for Tor Browser on Windows 10 start menu
    Bug 27503: Compile with accessibility support
    Bug 28874: Bump mingw-w64 commit to fix WebGL crash
    Bug 12885: Windows Jump Lists fail for Tor Browser
    Bug 28618: Set MOZILLA_OFFICIAL for Windows build

OS X

    Update Tor to 0.4.0.1-alpha
    Bug 25702: Activity 1.1 Update Tor Browser icon to follow design guidelines
    Bug 28111: Use Tor Browser icon in identity box

Linux

    Update Tor to 0.4.0.1-alpha
    Bug 25702: Activity 1.1 Update Tor Browser icon to follow design guidelines
    Bug 28111: Use Tor Browser icon in identity box
    Bug 27531: Fix crashing print dialog

Android

    Bug 28705: Fix download crash on newer Android devices
    Bug 28814: Backport 1480079 to allow installing downloaded apps

Build System

    All Platforms
        Bug 29158: Install updated apt packages (CVE-2019-3462)
        Bug 29097: Don't try to install python3.6-lxml for HTTPS Everywhere
    Windows
        Bug 26148: Update binutils to 2.31.1
        Bug 29081: Harden libwinpthread
    Linux
        Bug 26148: Update binutils to 2.31.1
    Android
        Bug 28752: Don't download tor-android-binary resources during build

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 8.2019.02
« Antwort #410 am: 01 Februar, 2019, 05:00 »
Whats new:>>

Tor updated to 0.3.5.7 with Libevent 2.1.8-stable, OpenSSL 1.0.2q, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.5.
• Tor: ObfsProxy configuration updated. Defaults to Obfs4. Use Vidalia 'Bridges' link to acquire more.
• WASTE: Updated to 1.8.0 Release. Build 063.0.0.0.
Reduce Anti-Spoof eagerness to notify.
Chat Room Persistence. Rooms will be kept open until all have closed their views of it.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 8.2019.02.1
« Antwort #411 am: 02 Februar, 2019, 20:30 »
Whats new:>>

WASTE: Updated to 1.8.0 Release. Build 063.0.0.1.
Chat Room Persistence, but only for forums Chats. Bugfix.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBeltPrivacy 8.2019.3 Beta
« Antwort #412 am: 09 Februar, 2019, 19:00 »
Whats new:>>

• WASTE : Updated to 1.8.0 Release. Build 064.0.0.4.
Switch off uPnP when communicating over invisible networks.
Better recognition of non-invisible addresses, in networking.
Enable Tor and i2p separate proxy UI.

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser v8.0.6
« Antwort #413 am: 13 Februar, 2019, 05:00 »
Changelog

All platforms

    Update Firefox to 60.5.1esr
    Update HTTPS Everywhere to 2019.1.31
    Bug 29378: Remove 83.212.101.3 from default bridges

Build System

    All Platforms
        Bug 29235: Build our own version of python3.6 for HTTPS Everywhere

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
OnionShare 2.0
« Antwort #414 am: 19 Februar, 2019, 20:30 »
Changelog

New feature: Receiver mode allows you to receive files with OnionShare, instead of only sending files
New feature: Support for next generation onion services
New feature: macOS sandbox is enabled
New feature: Public mode feature, for public uses of OnionShare, which when enabled turns off slugs in the URL and removes the limit on how many 404 requests can be made
New feature: If you're sharing a single file, don't zip it up
New feature: Full support for meek_lite (Azure) bridges
New feature: Allow selecting your language from a dropdown
New translations: Bengali (?????), Catalan (Català), Danish (Dansk), French (Français), Greek (????????), Italian (Italiano), Japanese (???), Persian (?????), Portuguese Brazil (Português Brasil), Russian (???????), Spanish (Español), Swedish (Svenska)
Several bugfixes
Invisible to users, but this version includes some major refactoring of the codebase, and a robust set of unit tests which makes OnionShare easier to maintain going forward

[close]

https://onionshare.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
BlackBelt Privacy Tor+WASTE+VoIP 8.2019.03
« Antwort #415 am: 23 Februar, 2019, 19:00 »
Changelog

WASTE : Updated to 1.8.0 Release. Build 064.0.1.0.
Switch off uPnP when communicating over invisible networks.
Better recognition of non-invisible addresses, during invisible-networking.
Enable Tor and i2p separate proxy UI.
Tune UI updates, network-timings, network-mapping.
Persist User Status between sessions.
Separate Address and Nickname internal heart-beats.
i2p Daemon : v2.23.0 .
Embedded i2p Daemon, automatically configured with socks4a/5 server.
The i2p Daemon has a server definition forwarding to 1337, the default WASTE port.
This means you can supply the ‘waste’ i2p address, from the i2p configuration
page, to WASTE, as its local i2p address, to allow access to your local WASTE node.

[close]

http://sourceforge.net/projects/blackbeltpriv/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.5a8
« Antwort #416 am: 26 Februar, 2019, 18:00 »
Changelog

All platforms

    Update Firefox to 60.5.1esr
    Update HTTPS Everywhere to 2019.1.31
    Bug 29378: Remove 83.212.101.3 from default bridges
    Bug 29349: Remove network.http.spdy.* overrides from meek helper user.js

Build System

    All Platforms
        Bug 29235: Build our own version of python3.6 for HTTPS Everywhere
        Bug 29167: Upgrade go to 1.11.5
    Linux
        Bug 29183: Use linux-x86_64 langpacks on linux-x86_64

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor 0.4.0.2-alpha, 0.3.5.8, 0.3.4.11, and 0.3.3.12
« Antwort #417 am: 26 Februar, 2019, 19:00 »
Changelog

There are new source code releases available for download. If you build Tor from source, you can download the source code for 0.4.0.2-alpha and 0.3.5.8 from the download page. You can find 0.3.4.11 and 0.3.3.12 at dist.torproject.org. Packages should be available over the coming weeks, with a new alpha Tor Browser release likely in the same timeframe.

These releases all fix TROVE-2019-001, a possible security bug involving the KIST cell scheduler code in versions 0.3.2.1-alpha and later. We are not certain that it is possible to exploit this bug in the wild, but out of an abundance of caution, we recommend that all affected users upgrade once packages are available. The potential impact is a remote denial-of-service attack against clients or relays.

Also note: 0.3.3.12 is the last anticipated release in the 0.3.3.x series; that series will become unsupported next week. The remaining supported stable series will 0.2.9.x (long-term support until 2020), 0.3.4.x (supported until June), and 0.3.5.x (long-term support until 2022).

Below are the changes in Tor 0.3.5.8 and in 0.4.0.2-alpha. You can also read the changelog for 0.3.4.11 and the changelog for 0.3.3.12.

Changes in version 0.3.5.8 - 2019-02-21

Tor 0.3.5.8 backports serveral fixes from later releases, including fixes for an annoying SOCKS-parsing bug that affected users in earlier 0.3.5.x releases.

It also includes a fix for a medium-severity security bug affecting Tor 0.3.2.1-alpha and later. All Tor instances running an affected release should upgrade to 0.3.3.12, 0.3.4.11, 0.3.5.8, or 0.4.0.2-alpha.

    Major bugfixes (cell scheduler, KIST, security):
        Make KIST consider the outbuf length when computing what it can put in the outbuf. Previously, KIST acted as though the outbuf were empty, which could lead to the outbuf becoming too full. It is possible that an attacker could exploit this bug to cause a Tor client or relay to run out of memory and crash. Fixes bug 29168; bugfix on 0.3.2.1-alpha. This issue is also being tracked as TROVE-2019-001 and CVE-2019-8955.
    Major bugfixes (networking, backport from 0.4.0.2-alpha):
        Gracefully handle empty username/password fields in SOCKS5 username/password auth messsage and allow SOCKS5 handshake to continue. Previously, we had rejected these handshakes, breaking certain applications. Fixes bug 29175; bugfix on 0.3.5.1-alpha.

 

    Minor features (compilation, backport from 0.4.0.2-alpha):
        Compile correctly when OpenSSL is built with engine support disabled, or with deprecated APIs disabled. Closes ticket 29026. Patches from "Mangix".
    Minor features (geoip):
        Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database. Closes ticket 29478.
    Minor features (testing, backport from 0.4.0.2-alpha):
        Treat all unexpected ERR and BUG messages as test failures. Closes ticket 28668.
    Minor bugfixes (onion service v3, client, backport from 0.4.0.1-alpha):
        Stop logging a "BUG()" warning and stacktrace when we find a SOCKS connection waiting for a descriptor that we actually have in the cache. It turns out that this can actually happen, though it is rare. Now, tor will recover and retry the descriptor. Fixes bug 28669; bugfix on 0.3.2.4-alpha.
    Minor bugfixes (IPv6, backport from 0.4.0.1-alpha):
        Fix tor_ersatz_socketpair on IPv6-only systems. Previously, the IPv6 socket was bound using an address family of AF_INET instead of AF_INET6. Fixes bug 28995; bugfix on 0.3.5.1-alpha. Patch from Kris Katterjohn.
    Minor bugfixes (build, compatibility, rust, backport from 0.4.0.2-alpha):
        Update Cargo.lock file to match the version made by the latest version of Rust, so that "make distcheck" will pass again. Fixes bug 29244; bugfix on 0.3.3.4-alpha.
    Minor bugfixes (client, clock skew, backport from 0.4.0.1-alpha):
        Select guards even if the consensus has expired, as long as the consensus is still reasonably live. Fixes bug 24661; bugfix on 0.3.0.1-alpha.
    Minor bugfixes (compilation, backport from 0.4.0.1-alpha):
        Compile correctly on OpenBSD; previously, we were missing some headers required in order to detect it properly. Fixes bug 28938; bugfix on 0.3.5.1-alpha. Patch from Kris Katterjohn.
    Minor bugfixes (documentation, backport from 0.4.0.2-alpha):
        Describe the contents of the v3 onion service client authorization files correctly: They hold public keys, not private keys. Fixes bug 28979; bugfix on 0.3.5.1-alpha. Spotted by "Felixix".
    Minor bugfixes (logging, backport from 0.4.0.1-alpha):
        Rework rep_hist_log_link_protocol_counts() to iterate through all link protocol versions when logging incoming/outgoing connection counts. Tor no longer skips version 5, and we won't have to remember to update this function when new link protocol version is developed. Fixes bug 28920; bugfix on 0.2.6.10.
    Minor bugfixes (logging, backport from 0.4.0.2-alpha):
        Log more information at "warning" level when unable to read a private key; log more information at "info" level when unable to read a public key. We had warnings here before, but they were lost during our NSS work. Fixes bug 29042; bugfix on 0.3.5.1-alpha.
    Minor bugfixes (misc, backport from 0.4.0.2-alpha):
        The amount of total available physical memory is now determined using the sysctl identifier HW_PHYSMEM (rather than HW_USERMEM) when it is defined and a 64-bit variant is not available. Fixes bug 28981; bugfix on 0.2.5.4-alpha. Patch from Kris Katterjohn.
    Minor bugfixes (onion services, backport from 0.4.0.2-alpha):
        Avoid crashing if ClientOnionAuthDir (incorrectly) contains more than one private key for a hidden service. Fixes bug 29040; bugfix on 0.3.5.1-alpha.
        In hs_cache_store_as_client() log an HSDesc we failed to parse at "debug" level. Tor used to log it as a warning, which caused very long log lines to appear for some users. Fixes bug 29135; bugfix on 0.3.2.1-alpha.
        Stop logging "Tried to establish rendezvous on non-OR circuit..." as a warning. Instead, log it as a protocol warning, because there is nothing that relay operators can do to fix it. Fixes bug 29029; bugfix on 0.2.5.7-rc.
    Minor bugfixes (tests, directory clients, backport from 0.4.0.1-alpha):
        Mark outdated dirservers when Tor only has a reasonably live consensus. Fixes bug 28569; bugfix on 0.3.2.5-alpha.
    Minor bugfixes (tests, backport from 0.4.0.2-alpha):
        Detect and suppress "bug" warnings from the util/time test on Windows. Fixes bug 29161; bugfix on 0.2.9.3-alpha.
        Do not log an error-level message if we fail to find an IPv6 network interface from the unit tests. Fixes bug 29160; bugfix on 0.2.7.3-rc.
    Minor bugfixes (usability, backport from 0.4.0.1-alpha):
        Stop saying "Your Guard ..." in pathbias_measure_{use,close}_rate(). Some users took this phrasing to mean that the mentioned guard was under their control or responsibility, which it is not. Fixes bug 28895; bugfix on Tor 0.3.0.1-alpha.

Changes in version 0.4.0.2-alpha - 2019-02-21

Tor 0.4.0.2-alpha is the second alpha in its series; it fixes several bugs from earlier versions, including several that had broken backward compatibility.

It also includes a fix for a medium-severity security bug affecting Tor 0.3.2.1-alpha and later. All Tor instances running an affected release should upgrade to 0.3.3.12, 0.3.4.11, 0.3.5.8, or 0.4.0.2-alpha.

    Major bugfixes (cell scheduler, KIST, security):
        Make KIST consider the outbuf length when computing what it can put in the outbuf. Previously, KIST acted as though the outbuf were empty, which could lead to the outbuf becoming too full. It is possible that an attacker could exploit this bug to cause a Tor client or relay to run out of memory and crash. Fixes bug 29168; bugfix on 0.3.2.1-alpha. This issue is also being tracked as TROVE-2019-001 and CVE-2019-8955.
    Major bugfixes (networking):
        Gracefully handle empty username/password fields in SOCKS5 username/password auth messsage and allow SOCKS5 handshake to continue. Previously, we had rejected these handshakes, breaking certain applications. Fixes bug 29175; bugfix on 0.3.5.1-alpha.
    Major bugfixes (windows, startup):
        When reading a consensus file from disk, detect whether it was written in text mode, and re-read it in text mode if so. Always write consensus files in binary mode so that we can map them into memory later. Previously, we had written in text mode, which confused us when we tried to map the file on windows. Fixes bug 28614; bugfix on 0.4.0.1-alpha.
    Minor features (compilation):
        Compile correctly when OpenSSL is built with engine support disabled, or with deprecated APIs disabled. Closes ticket 29026. Patches from "Mangix".
    Minor features (developer tooling):
        Check that bugfix versions in changes files look like Tor versions from the versions spec. Warn when bugfixes claim to be on a future release. Closes ticket 27761.
        Provide a git pre-commit hook that disallows commiting if we have any failures in our code and changelog formatting checks. It is now available in scripts/maint/pre-commit.git-hook. Implements feature 28976.
    Minor features (directory authority):
        When a directory authority is using a bandwidth file to obtain bandwidth values, include the digest of that file in the vote. Closes ticket 26698.
    Minor features (geoip):
        Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database. Closes ticket 29478.
    Minor features (testing):
        Treat all unexpected ERR and BUG messages as test failures. Closes ticket 28668.
    Minor bugfixes (build, compatibility, rust):
        Update Cargo.lock file to match the version made by the latest version of Rust, so that "make distcheck" will pass again. Fixes bug 29244; bugfix on 0.3.3.4-alpha.
    Minor bugfixes (compilation):
        Fix compilation warnings in test_circuitpadding.c. Fixes bug 29169; bugfix on 0.4.0.1-alpha.
        Silence a compiler warning in test-memwipe.c on OpenBSD. Fixes bug 29145; bugfix on 0.2.9.3-alpha. Patch from Kris Katterjohn.
    Minor bugfixes (documentation):
        Describe the contents of the v3 onion service client authorization files correctly: They hold public keys, not private keys. Fixes bug 28979; bugfix on 0.3.5.1-alpha. Spotted by "Felixix".
    Minor bugfixes (linux seccomp sandbox):
        Fix startup crash when experimental sandbox support is enabled. Fixes bug 29150; bugfix on 0.4.0.1-alpha. Patch by Peter Gerber.
    Minor bugfixes (logging):
        Avoid logging that we are relaxing a circuit timeout when that timeout is fixed. Fixes bug 28698; bugfix on 0.2.4.7-alpha.
        Log more information at "warning" level when unable to read a private key; log more information at "info" level when unable to read a public key. We had warnings here before, but they were lost during our NSS work. Fixes bug 29042; bugfix on 0.3.5.1-alpha.
    Minor bugfixes (misc):
        The amount of total available physical memory is now determined using the sysctl identifier HW_PHYSMEM (rather than HW_USERMEM) when it is defined and a 64-bit variant is not available. Fixes bug 28981; bugfix on 0.2.5.4-alpha. Patch from Kris Katterjohn.
    Minor bugfixes (onion services):
        Avoid crashing if ClientOnionAuthDir (incorrectly) contains more than one private key for a hidden service. Fixes bug 29040; bugfix on 0.3.5.1-alpha.
        In hs_cache_store_as_client() log an HSDesc we failed to parse at "debug" level. Tor used to log it as a warning, which caused very long log lines to appear for some users. Fixes bug 29135; bugfix on 0.3.2.1-alpha.
        Stop logging "Tried to establish rendezvous on non-OR circuit..." as a warning. Instead, log it as a protocol warning, because there is nothing that relay operators can do to fix it. Fixes bug 29029; bugfix on 0.2.5.7-rc.
    Minor bugfixes (scheduler):
        When re-adding channels to the pending list, check the correct channel's sched_heap_idx. This issue has had no effect in mainline Tor, but could have led to bugs down the road in improved versions of our circuit scheduling code. Fixes bug 29508; bugfix on 0.3.2.10.
    Minor bugfixes (tests):
        Fix intermittent failures on an adaptive padding test. Fixes one case of bug 29122; bugfix on 0.4.0.1-alpha.
        Disable an unstable circuit-padding test that was failing intermittently because of an ill-defined small histogram. Such histograms will be allowed again after 29298 is implemented. Fixes a second case of bug 29122; bugfix on 0.4.0.1-alpha.
        Detect and suppress "bug" warnings from the util/time test on Windows. Fixes bug 29161; bugfix on 0.2.9.3-alpha.
        Do not log an error-level message if we fail to find an IPv6 network interface from the unit tests. Fixes bug 29160; bugfix on 0.2.7.3-rc.
    Documentation:
        In the manpage entry describing MapAddress torrc setting, use example IP addresses from ranges specified for use in documentation by RFC 5737. Resolves issue 28623.
    Removed features:
        Remove the old check-tor script. Resolves issue 29072.

[close]

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Tor Browser 8.0.7
« Antwort #418 am: 19 März, 2019, 06:00 »
Changelog

 * All platforms

   * Update Firefox to 60.6.0esr
   * Update Tor to 0.3.5.8
     * Bug 29660: XMPP can not connect to SOCKS5 anymore
   * Update Torbutton to 2.0.11
     * Bug 29021: Tell NoScript it is running within Tor Browser

 * Windows

   * Bug 29081: Harden libwinpthread

 * Linux

   * Bug 27531: Add separate LD_LIBRARY_PATH for fteproxy

[close]

Download -> https://www.torproject.org/dist/torbrowser/8.0.7/

https://www.torproject.org/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 191383
  • Ohne Input kein Output
    • DVB-Cube
Pirate Browser 0.8 (8.0.7)
« Antwort #419 am: 19 März, 2019, 18:00 »
PirateBrowser is a bundle package of the Tor client and FireFox Portable browser and custom configs that allow you to circumvent censorship.

PirateBrowser is a bundle package of the Tor client (Vidalia) and FireFox Portable browser (with foxyproxy addon) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.

Freeware

https://lilfellauk.wordpress.com/pirate-tor-browser/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )