Changes between Version 67 and Version 68 of TorWeeklyNews/2013/10


Ignore:
Timestamp:
Sep 10, 2013, 1:53:20 PM (6 years ago)
Author:
karsten
Comment:

Minor language fixes.

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2013/10

    v67 v68  
    2020There are now confirmations [1] that the sudden influx of Tor clients
    2121which started mid-August [2] is indeed coming from a botnet. “I guess
    22 all that work we’ve been doing on scalability was a good idea” wrote
    23 Roger Dingledine wrote in a blog post about “how to handle millions of
     22all that work we’ve been doing on scalability was a good idea,” wrote
     23Roger Dingledine in a blog post about “how to handle millions of
    2424new Tor clients” [3].
    2525
     
    6868
    6969A lot of what has been written is speculative at this point. But some
    70 have raised concerns [12] about 1024 bit Diffie-Helmank key
    71 exchange [13]. This has already been adressed with the introduction of
     70have raised concerns [12] about 1024 bit Diffie-Hellman key
     71exchange [13]. This has already been addressed with the introduction of
    7272the “ntor” handshake [14] in 0.2.4 and Nick Mathewson encourages
    7373everybody to upgrade [15].
    7474
    75 Another thread [16] prompted Nick to summarize [17] its views on the
     75Another thread [16] prompted Nick to summarize [17] his views on the
    7676future of Tor cryptography. Regarding public keys, “with Tor 0.2.4,
    7777forward secrecy uses 256-bit ECC, which is certainly better, but
     
    9292
    9393A third question was raised [22] regarding the trust in algorithms
    94 certified by the US NIST [23]. Nick speculations put aside, he also
    95 emphasised that several NIST algorithms were “hard to implement
     94certified by the US NIST [23]. Nick's speculations put aside, he also
     95emphasized that several NIST algorithms were “hard to implement
    9696correctly” [24].
    9797
     
    139139cover new use cases.”
    140140
    141 The specification lay out the various requirements for the new tool, and
     141The specification lays out the various requirements for the new tool, and
    142142details several experiments like visiting high profile websites with an
    143143automated graphical web browser, downloading static files, crafting a
     
    187187Not all new Tor users are computer programs! According to their latest
    188188report [42], Tails is now booted twice as much as six months ago (from
    189 100 865 to 190 521 connections to the security feed).
     189100,865 to 190,521 connections to the security feed).
    190190
    191191  [42] https://lists.torproject.org/pipermail/tor-reports/2013-September/000336.html
     
    208208  [48] https://lists.torproject.org/pipermail/tor-dev/2013-September/005412.html
    209209
    210 Damian Johnson anounced [49] he had completed the rewrite of DocTor in
     210Damian Johnson announced [49] he had completed the rewrite of DocTor in
    211211Python [50], “a service that pulls hourly consensus information and
    212212checks it for a host of issues (directory authority outages, expiring
     
    237237For the upgrade of tor to the 0.2.4.x series in Tails, a tester spotted
    238238a regression while “playing with an ISO built from experimental, thanks
    239 to our Jenkins autobuilder” [56]. This mark a significant milestone in
     239to our Jenkins autobuilder” [56]. This marks a significant milestone in
    240240the work on automated builds [57] done by the several member of the
    241241Tails team in the course of the last year!
     
    256256
    257257Marek Majkowski reported [61] on how one can use his fluxcapacitor
    258 tool [62] to get a test Tor network started with Chutney [63] ready is
     258tool [62] to get a test Tor network started with Chutney [63] ready in
    259259only 6.5 seconds. A vast improvement over the 5 minutes he initially had
    260260to wait [64]!
     
    266266
    267267Eugen Leitl drew attention [65] to a new research paper which aims to
    268 analyse content and popularity of Hidden Services by Alex Biryukov, Ivan
     268analyze content and popularity of Hidden Services by Alex Biryukov, Ivan
    269269Pustogarov, and Ralf-Philipp Weinmann from University of
    270270Luxembourg [66].
     
    300300
    301301Tor is about protecting everyone’s freedom and privacy. There are many
    302 way to help [69] but getting involved in such a busy community can be
     302ways to help [69] but getting involved in such a busy community can be
    303303daunting. Here’s a selection of tasks on which one can get started:
    304304
    305305Get tor to log the source of control port connection [70]. It would help
    306 developping controller applications or libraries (like Stem [71]) to
     306developing controller applications or libraries (like Stem [71]) to
    307307know which program is responsible for a given access to the control
    308308facilities of the tor daemon. Knowledge required: C programming, basic