1. We are sorrowed to report that one of the Founding Members has passed on. Dee (Righthand) is well remembered as contributing much to the operation of SurvivalMonkey, and is already greatly missed. Little lady, big person.

TOR Tor 0.3.0.7 was released last week!

Discussion in 'TOR | TAILS' started by survivalmonkey, May 26, 2017.


  1. survivalmonkey

    survivalmonkey Monkey+++

    Tor 0.3.0.7 was released last week! nickm May 26, 2017

    Hello! This release came out 11 days ago, but since the blog was down at the time, I was only able to announce on the tor-announce@ mailing list. Nevertheless, I'm copying it here in case anyone didn't see it.

    Tor 0.3.0.7 fixes a medium-severity security bug in earlier versions of Tor 0.3.0.x, where an attacker could cause a Tor relay process to exit. Relays running earlier versions of Tor 0.3.0.x should upgrade; clients are not affected.

    If you build Tor from source, you can find it at the usual place on the website. Packages should be ready over the next weeks.

    Changes in version 0.3.0.7 - 2017-05-15

    • Major bugfixes (hidden service directory, security):
      • Fix an assertion failure in the hidden service directory code, which could be used by an attacker to remotely cause a Tor relay process to exit. Relays running earlier versions of Tor 0.3.0.x should upgrade. This security issue is tracked as TROVE-2017-002. Fixes bug 22246; bugfix on 0.3.0.1-alpha.
    • Minor features:
      • Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2 Country database.
    • Minor features (future-proofing):
      • Tor no longer refuses to download microdescriptors or descriptors if they are listed as "published in the future". This change will eventually allow us to stop listing meaningful "published" dates in microdescriptor consensuses, and thereby allow us to reduce the resources required to download consensus diffs by over 50%. Implements part of ticket 21642; implements part of proposal 275.
    • Minor bugfixes (Linux seccomp2 sandbox):
      • The getpid() system call is now permitted under the Linux seccomp2 sandbox, to avoid crashing with versions of OpenSSL (and other libraries) that attempt to learn the process's PID by using the syscall rather than the VDSO code. Fixes bug 21943; bugfix on 0.2.5.1-alpha.

    Continue reading...
     
survivalmonkey SSL seal        survivalmonkey.com warrant canary
17282WuJHksJ9798f34razfKbPATqTq9E7