wiki:TorWeeklyNews/2014/31

Version 28 (modified by lunar, 5 years ago) (diff)

write about Tails call for testers

57th issue of Tor Weekly News. Covering what's happening from July 29th, 2014 to August 5th, 2014. To be released on August 6th, 2014.

Editor:

Subject: Tor Weekly News — August 6th, 2014

========================================================================
Tor Weekly News                                         August 6th, 2014
========================================================================

Welcome to the thirty-first issue of Tor Weekly News in 2014, the weekly
newsletter that covers what is happening in the XXX Tor community.

Feature XXX
-----------

Feature 1 with cited source [XXX]

 [XXX]:

Why is bad-relays a closed mailing list?
----------------------------------------

Damian Johnson and Philipp Winter have been working on improving the
process of reporting bad relays [XXX]. The process starts by having
users report odd behaviors to the bad-relays mailing list.

Only a few trusted volunteers receive and review these reports. Nusenu
started a discussion on tor-talk [XXX] advocating for more transparency.
Nusenu argues that an open list would “likely get more confirm/can't
confirm feedback for a given badexit candidate”, and that it would allow
worried users to act faster than operators of directory authorities.

Despite being “usually on the side of transparency”, Roger Dingledine
udescribe [XXX] being “stuck” on the issue, “because the arms race is so
lopsidedly against us”.

Roger explains: “we can scan for whether exit relays handle certain
websites poorly, but if the list that we scan for is public, then exit
relays can mess with other websites and know they'll get away with it.
We can scan for incorrect behavior on various ports, but if the list of
ports and the set of behavior we do is public, then again relays are
free to mess with things we don't look for.”

A better future and more transparency probably lies in adaptative test
systems run by multiple volunteer groups. Until they come to existence,
as a small improvement, Philipp Winter wrote [XXX] it was probably safe
to publish why relays were disabled, through “short sentence along the
lines of ‘running HTTPS MitM’ or ‘running sslstrip’”.

 [XXX]: https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays
 [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-July/034198.html
 [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-July/034219.html
 [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-July/034216.html

Monthly status reports for July 2014
------------------------------------

Time for monthly reports from Tor project members. The July 2014 round
was opened by Georg Koppen [XXX], followed by Philipp Winter [XXX],
Sherief Alaa [XXX], Lunar [XXX], Nick Mathewson [XXX], Pearl
Crescent [XXX], George Kadianakis [XXX], Matt Pagan [XXX], Isis
Lovecruft [XXX], and Griffin Boyce [XXX].

 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000598.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000599.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000601.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000603.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000604.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000605.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000608.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000609.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000610.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000611.html

Lunar reported on behalf of the help desk [XXX] and Mike Perry for the
Tor Browser team [XXX].

 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000602.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000607.html

Miscellaneous news
------------------

Anthony G. Basile announced a new release of tor-ramdisk, an i686 or
x86_64 uClibc-based micro Linux distribution whose only purpose is to
host a Tor server. Version 20140801 [XXX] updates Tor to version
0.2.4.23, and the kernel to 3.15.7 with Gentoo's hardened patches.

 [XXX]: http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-August/000132.html

meejah has announced [XXX] a new command-line application. carml is a versatile
set of tools to “query and control a running Tor”. It can do things like “list
and remove streams and circuits; monitor stream, circuit and address-map
events; watch for any Tor event and print it (or many) out; monitor bandwidth;
run any Tor control-protocol command; pipe through common Unix tools like grep,
less, cut, etcetera; download TBB through Tor, with pinned certs and signature
checking; and even spit out and run xplanet configs (with router/circuit
markers)!” The application is written in Python and uses the
txtorcon library [XXX]. meejah describes it as early-alpha and warn that it
might contain “serious, anonymity-destroying bugs”. Watch out!

 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007295.html
 [XXX]: https://github.com/meejah/carml
 [XXX]: https://txtorcon.readthedocs.org/

Only two weeks left for the Google Summer of Code students, and the last but
one round of reports: Juha Nurmi on the ahmia.fi project [XXX], Marc Juarez on
website fingerprinting defenses [XXX], Amogh Pradeep on Orbot and Orfox
improvements [XXX], Zack Mullaly on the HTTPS Everywhere secure ruleset update
mechanism [XXX], Israel Leiva on the GetTor revamp [XXX], Quinn Jarrell on the
pluggable transport combiner [XXX], Daniel Martí on incremental updates to
consensus documents [XXX], Noah Rahman on Stegotorus enhancements [XXX],
and Sreenatha Bhatlapenumarthi on the Tor Weather rewrite [XXX].

 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000600.html
 [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-August/000606.html
 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007282.html
 [XXX]: https://lists.eff.org/pipermail/https-everywhere/2014-August/002199.html
 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007284.html
 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007285.html
 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007287.html
 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007288.html
 [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-August/007293.html

The Tails team is looking for testers to solve a possible incompatiblity
in one of the recommended installation procedure. If you have a running Tails
system, a spare USB stick and some time, please help [XXX]. Don't miss
the recommended command-line options [XXX]!

 [XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-July/000059.html
 [XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-July/000060.html

Tor help desk roundup
---------------------

Summary of some questions sent to the Tor help desk. 

News from Tor StackExchange
---------------------------

Text with cited source [XXX].

 [XXX]:

Easy development tasks to get involved with
-------------------------------------------

Text with cited source [XXX].

 [XXX]: 

Upcoming events
---------------

 Aug.  6 19:00 UTC | little-t tor development meeting
                   | #tor-dev, irc.oftc.net
                   |
 Aug. 11 18:00 UTC | Tor Browser online meeting
                   | #tor-dev, irc.oftc.net
                   | https://lists.torproject.org/pipermail/tbb-dev/2014-August/000100.html
                   |
 August 18         | Roger @ FOCI ’14
                   | San Diego, California, USA
                   | https://www.usenix.org/conference/foci14
                   |
 August 20-22      | Roger @ USENIX Security Symposium ’14
                   | San Diego, California, USA
                   | https://www.usenix.org/conference/usenixsecurity14


This issue of Tor Weekly News has been assembled by XXX, XXX, and
XXX.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [XXX], write down your
name and subscribe to the team mailing list [XXX] if you want to
get involved!

  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

Possible items: