Changes between Version 39 and Version 40 of TorWeeklyNews/2013/10


Ignore:
Timestamp:
Sep 9, 2013, 3:34:45 PM (6 years ago)
Author:
lunar
Comment:

rework the piece about the new release

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2013/10

    v39 v40  
    1616----------------------
    1717
    18 On 5th September, Roger Dingledine announced the release of a new release candidate
    19 for Tor 0.2.4 series [XXX]. It comes with very handy feature in the current situation [XXX]
    20 - prioritizing faster and safer circuit-level handshakes "NTor" over "TAP" used by
    21 0.2.3 clients.
    22 
    23 “Relays now process the new "NTor" circuit-level handshake requests with higher
    24 priority than the old "TAP" circuit-level handshake requests. We still process
    25 some TAP requests to not totally starve 0.2.3 clients when NTor becomes popular.
    26 A new consensus parameter "NumNTorsPerTAP" lets us tune the balance later if we
    27 need to. Implements ticket 9574 [XXX].”
    28 
    29 Roger asks relay operators to consider upgrading to 0.2.4.17-rc version due the huge
    30 circuit overload we see nowadays [XXX]. Upgrading to development branch is surprisingly
    31 easy using this guide [XXX].
    32 
     18There are now confirmations [XXX] that the sudden influx of Tor clients which
     19started mid-August is indeed coming from a botnet. “I guess all that
     20work we've been doing on scalability was a good idea” wrote Roger
     21Dingledine wrote in a blog post about “how to handle millions of new
     22Tor clients” [XXX].
     23
     24On September 5th, Roger Dingledine announced the release of the third
     25release candidate for the tor 0.2.4 series [XXX]. This is an emergency
     26release “to help us tolerate the massive influx of users: 0.2.4 clients
     27using the new (faster and safer) ‘NTor’ circuit-level handshakes now
     28effectively jump the queue compared to the 0.2.3 clients using ‘TAP’
     29handshakes” [XXX].
     30
     31It also contains several minor bugfixes and some new status messages for
     32better monitoring of the current situation.
     33
     34Roger asked relay operators to upgrade to 0.2.4.17-rc [XXX]: “the more
     35relays that upgrade to 0.2.4.17-rc, the more stable and fast Tor will be
     36for 0.2.4 users, despite the huge circuit overload that the network is
     37seeing.”
     38
     39For relays running Debian or Ubuntu, upgrading to the development branch
     40can be done using the Tor project's package repository [XXX]. New
     41versions of the beta branch of the Tor Browser Bundle are also
     42available [XXX] since September 6th.
     43
     44Hopefully, this will be the last release candidate. What looks missing
     45at this point to declare the 0.2.4.x series stable is simply enough time
     46to finish the release notes.
     47
     48  [XXX] http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/
     49  [XXX] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
    3350  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-September/029857.html
    34   [XXX] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
    3551  [XXX] https://trac.torproject.org/projects/tor/ticket/9574
    3652  [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-September/002701.html
    3753  [XXX] https://www.torproject.org/docs/debian.html.en#development
    38 
    39  XXX:Expand
     54  [XXX] https://blog.torproject.org/blog/new-tor-02417-rc-packages
    4055
    4156The future of Tor cryptography
     
    303318 * George forgot the torrc modification in his howto https://lists.torproject.org/pipermail/tor-relays/2013-September/002691.html
    304319 * Karsten's notes on IRC dev-meeting https://lists.torproject.org/pipermail/tor-dev/2013-September/005370.html / Nathan's https://lists.torproject.org/pipermail/tor-dev/2013-September/005371.html
    305  * Tor 0.2.4.17-rc https://lists.torproject.org/pipermail/tor-relays/2013-September/002701.html https://lists.torproject.org/pipermail/tor-talk/2013-September/029857.html https://blog.torproject.org/blog/new-tor-02417-rc-packages
    306  * arma's blog post https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
    307320 * another research paper about hidden services https://lists.torproject.org/pipermail/tor-talk/2013-September/029856.html
    308  * fox-it blog post https://lists.torproject.org/pipermail/tor-talk/2013-September/029862.html http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/
    309321 * Testing flash proxy infrastructure https://lists.torproject.org/pipermail/tor-dev/2013-September/005402.html
    310322 * Quickly testing TOR using Chutney and Fluxcapacitor https://lists.torproject.org/pipermail/tor-dev/2013-September/005403.html