Delivery-Date: Wed, 04 Jun 2014 08:41:20 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by moria.seul.org (Postfix) with ESMTPS id 8DD501E094C
	for <archiver@seul.org>; Wed,  4 Jun 2014 08:41:18 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AA51D2F4AB;
	Wed,  4 Jun 2014 12:41:07 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 6161A2E3A6;
 Wed,  4 Jun 2014 12:34:36 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id v2aS6p7y0HvY; Wed,  4 Jun 2014 12:34:36 +0000 (UTC)
Received: from mail.potager.org (quatre.potager.org [91.194.60.100])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.potager.org",
 Issuer "StartCom Class 2 Primary Intermediate Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 1820C2DE76;
 Wed,  4 Jun 2014 12:34:36 +0000 (UTC)
Received: from [127.0.0.1] (localhost [127.0.0.1]) with ESMTPSA id DDAB9C2B09C
Date: Wed, 4 Jun 2014 14:34:29 +0200
From: Lunar <lunar@torproject.org>
To: tor-news@lists.torproject.org, tor-talk@lists.torproject.org
Message-ID: <20140604123429.GC10073@loar>
Mail-Followup-To: tor-news@lists.torproject.org, tor-talk@lists.torproject.org
MIME-Version: 1.0
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: [tor-talk] =?utf-8?q?Tor_Weekly_News_=E2=80=94_June_4th=2C_2014?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0276747219214304410=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


--===============0276747219214304410==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="ctP54qlpMx3WjD+/"
Content-Disposition: inline


--ctP54qlpMx3WjD+/
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Tor Weekly News                                           June 4th, 2014
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Welcome to the twenty-second issue of Tor Weekly News in 2014, the
weekly newsletter that covers what is happening in the Tor community.

Tails moves to Wheezy
---------------------

The Tails live system=C2=A0[1] is a Debian derivative=C2=A0[2] aiming at
preserving the privacy and anonymity of its users.

The first Tails releases were based on Debian Lenny=C2=A0[3] (2009-2012);
since version 0.7, Tails has been based on Debian Squeeze=C2=A0[4] (2011-).
Meanwhile, Debian has released a new stable version dubbed Wheezy=C2=A0[5],
and the upcoming Tails 1.1 will be the first release to be based on the
latter.

The general set of features should not change much from the previous
Tails release, but almost every software component has been updated. On
May 30th, the Tails team released a beta image=C2=A0[6]; given the number of
changes, testing is even more welcome than usual.

Testers can also try out the new UEFI support, which enables Tails to
boot on recent hardware and on Macs.

Several issues=C2=A0[7] with the current beta image have already been
identified, so be sure to have a look at the list before reporting=C2=A0[8].

The details of the release schedule are still being discussed=C2=A0[9] at t=
he
time of writing, but Tails 1.1 is likely to be out by the end of July.
Please help make it a great release!

   [1]:=C2=A0https://tails.boum.org/
   [2]:=C2=A0https://wiki.debian.org/Derivatives
   [3]:=C2=A0https://www.debian.org/releases/lenny/
   [4]:=C2=A0https://www.debian.org/releases/squeeze/
   [5]:=C2=A0https://www.debian.org/releases/wheezy/
   [6]:=C2=A0https://tails.boum.org/news/test_1.1-beta1/
   [7]:=C2=A0https://tails.boum.org/news/test_1.1-beta1/#index3h1
   [8]:=C2=A0https://tails.boum.org/doc/first_steps/bug_reporting/
   [9]:=C2=A0https://mailman.boum.org/pipermail/tails-dev/2014-May/005917.h=
tml

Stem 1.2 brings interactive interaction with the Tor daemon
-----------------------------------------------------------

On June 1st, Damian Johnson announced=C2=A0[10] the release of Stem=C2=A0[1=
1] 1.2.
Stem is a Python library for interacting with the Tor daemon. It is now
used by several applications=C2=A0[12] like the arm=C2=A0[13] status monito=
r and
Philipp Winter=E2=80=99s exit scanner=C2=A0[14].

The new version brings an interactive control interpreter, =E2=80=9Ca new m=
ethod
for interacting with Tor=E2=80=99s control interface that combines an
interactive python interpreter with raw access similar to telnet=E2=80=9D. =
This
should make Tor hackers happy by saving them from having to manually
poke the control port through telnet or create complete Stem scripts.

For the complete list of changes, head over to the changelog=C2=A0[15].

  [10]:=C2=A0https://blog.torproject.org/blog/stem-release-12
  [11]:=C2=A0https://stem.torproject.org/
  [12]:=C2=A0https://stem.torproject.org/tutorials/double_double_toil_and_t=
rouble.html
  [13]:=C2=A0https://www.atagar.com/arm/
  [14]:=C2=A0http://www.cs.kau.se/philwint/spoiled_onions/
  [15]:=C2=A0https://stem.torproject.org/change_log.html#version-1-2

Monthly status reports for May 2014
-----------------------------------

The wave of regular monthly reports from Tor project members for the
month of May has begun. Pearl Crescent released their report first=C2=A0[16=
],
followed by Sherief Alaa=C2=A0[17], Damian Johnson=C2=A0[18], Nick Mathewso=
n=C2=A0[19],
Colin C.=C2=A0[20], Georg Koppen=C2=A0[21], Lunar=C2=A0[22], Arlo Breault=
=C2=A0[23], and
Matt Pagan=C2=A0[24].

Lunar also reported on behalf of the help desk=C2=A0[25], while Arturo
Filast=C3=B2 did likewise for the OONI team=C2=A0[26], and Mike Perry for t=
he Tor
Browser team=C2=A0[27].

  [16]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-May/00=
0539.html
  [17]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-May/00=
0540.html
  [18]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00542.html
  [19]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00543.html
  [20]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00544.html
  [21]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00545.html
  [22]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00546.html
  [23]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00548.html
  [24]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00550.html
  [25]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00541.html
  [26]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00547.html
  [27]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-June/0=
00549.html

Miscellaneous news
------------------

Pups, a chat system implemented by Sherief Alaa for real-time
invitation-based user support, has gone live=C2=A0[28], and can now be used
by Tor=E2=80=99s support assistants when that method promises a quicker
resolution of an issue.

  [28]:=C2=A0https://bugs.torproject.org/11657

In response to a question about the writing of unit tests for tor, Nick
Mathewson shared=C2=A0[29] a brief guide to identifying lines in tor=E2=80=
=99s
codebase that have not yet been covered by tests.

  [29]:=C2=A0https://lists.torproject.org/pipermail/tor-dev/2014-June/00693=
3.html

Nick also put out a call (relayed by Moritz Bartl=C2=A0[30]) for Tor relay
operators running version 0.2.5.4-alpha or later to profile their
relays, in order to identify potential bottlenecks. Basic instructions
for doing so on Debian and Ubuntu can be found in the comments to the
relevant ticket=C2=A0[31].

  [30]:=C2=A0https://lists.torproject.org/pipermail/tor-relays/2014-May/004=
617.html
  [31]:=C2=A0https://bugs.torproject.org/11332

During a discussion on the role of JavaScript hooks in Tor Browser, Mike
Perry clarified=C2=A0[32] the merits of writing direct C++ Firefox patches
over using such hooks, as well as the possibility of incorporating
Torbutton=E2=80=99s privacy features into either Firefox itself or a dedica=
ted
add-on.

  [32]:=C2=A0https://lists.torproject.org/pipermail/tbb-dev/2014-June/00007=
4.html

Andrew Lewman reported=C2=A0[33] on his trip to Stockholm to address Sida a=
nd
the Stockholm Internet Forum.

  [33]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-May/00=
0538.html

Juha Nurmi sent the second weekly report=C2=A0[34] for the ahmia.fi Google
Summer of Code project.

  [34]:=C2=A0https://lists.torproject.org/pipermail/tor-reports/2014-May/00=
0537.html

Marc Juarez is working on website fingerprinting countermeasures in the
form of a pluggable transport. Marc wants to =E2=80=9Cimplement a set of
primitives that any link padding-based defense would benefit of=E2=80=9D an=
d is
looking for feedback=C2=A0[35] on the envisaged primitives.

  [35]:=C2=A0https://lists.torproject.org/pipermail/tor-dev/2014-May/006918=
=2Ehtml

Philipp Winter announced=C2=A0[36] that Atlas=C2=A0[37], the web applicatio=
n to
learn about currently running Tor relays, will now display information
about a relay=E2=80=99s IPv6 exit policy, as well as the already-existing I=
Pv4
exit summary.

  [36]:=C2=A0https://lists.torproject.org/pipermail/tor-relays/2014-May/004=
620.html
  [37]:=C2=A0https://atlas.torproject.org

Tor help desk roundup
---------------------

Sometimes users with no network obstacles will email the help desk to
ask how to configure their Tor Browser. Often these users will not need
to configure anything, and clicking =E2=80=9CConnect=E2=80=9D is all that i=
s necessary.
Discussion on this problem is taking place on the bug tracker=C2=A0[38].

  [38]:=C2=A0https://bugs.torproject.org/12164

Easy development tasks to get involved with
-------------------------------------------

The bridge distributor BridgeDB=C2=A0[39] populates its database from the
cached descriptor files copied over from the bridge authority. There=E2=80=
=99s a
small bug=C2=A0[40] in BridgeDB where a line that is included in two
different cached descriptor files gets added twice to the database. The
ticket says this bug is easily reproducible and even contains commands
for reproducing it. If you enjoy digging into unknown Python/Twisted
codebases to find the few spots that need fixing, this bug may be for
you. Be sure to comment on the ticket when you have a fix!

  [39]:=C2=A0https://bridges.torproject.org/
  [40]:=C2=A0https://bugs.torproject.org/11216

Upcoming events
---------------

June  4 18:00 UTC | Tor Weather development meeting
                  | #tor-dev, irc.oftc.net
                  | https://lists.torproject.org/pipermail/tor-dev/2014-Jun=
e/006937.html
                  |
June  4 19:00 UTC | little-t tor development meeting
                  | #tor-dev, irc.oftc.net
                  | https://lists.torproject.org/pipermail/tor-dev/2014-Jun=
e/006938.html
                  |
June  6 15:00 UTC | Tor Browser online meeting
                  | #tor-dev, irc.oftc.net
                  | https://lists.torproject.org/pipermail/tbb-dev/2014-Apr=
il/000049.html
                  |
June  6 16:00 UTC | Pluggable transports online meeting
                  | #tor-dev, irc.oftc.net
                  | https://lists.torproject.org/pipermail/tor-dev/2014-Apr=
il/006764.html
                  |
June  7 19:00 CDT | Colin @ CryptoParty, Winnipeg
                  | SkullSpace, Winnipeg, MB, Canada
                  | http://wiki.skullspace.ca/index.php/CryptoParty
                  |
June 11 19:00 UTC | Tails contributors meeting
                  | #tails-dev, irc.oftc.net
                  | https://mailman.boum.org/pipermail/tails-dev/2014-May/0=
05818.html


This issue of Tor Weekly News has been assembled by harmony, Lunar,
Matt Pagan and Karsten Loesing.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page=C2=A0[41], write down your
name and subscribe to the team mailing list=C2=A0[42] if you want to
get involved!

  [41]:=C2=A0https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [42]:=C2=A0https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

--ctP54qlpMx3WjD+/
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=rTs+
-----END PGP SIGNATURE-----

--ctP54qlpMx3WjD+/--

--===============0276747219214304410==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============0276747219214304410==--

