Testers Wanted! Tor – Stable Upgrades

Tor was updated to 0.2.8.10 in Whonix stable-proposed-updates as well as in testers repository.

Instructions for changing Whonix repository:
https://www.whonix.org/wiki/Whonix-APT-Repository

Then just do a update:
https://www.whonix.org/wiki/Update

Patrick Schleizer on BloggerPatrick Schleizer on EmailPatrick Schleizer on FacebookPatrick Schleizer on GithubPatrick Schleizer on Twitter
Patrick Schleizer
Developer and maintainer at Whonix
Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.

Patrick started developing Whonix, the Anonymous Operating System in 2012, when quickly others joined efforts. He collected experiences working pseudonymous on Whonix for two years, enjoys collaboratively working on privacy preserving software.

Posted in Uncategorized

Notable Replies

  1. Tested briefly on Virtualbox-Whonix. No obvious issues.

    When was 0.2.8.10-rc announced and how? I don't see any announcement on tor-announce or tor-talk. I wouldn't want to add jessie-proposed-updates to my stable machines and I don't want to check constantly if there are new versions on a test machine. But I'd like to test before stable release - and maybe switch my repo back deb.torproject.org.

  2. In that case you can try anon-shared-build-apt-sources-tpo.

    sudo apt-get install anon-shared-build-apt-sources-tpo

    It will add torproject signing key as well as the deb.torproject.org repository.

    After that, I also recommend sudo apt-get install deb.torproject.org-keyring.

  3. 0.2.8.11 released but seems optional for Whonix:

    Changes in version 0.2.8.11 - 2016-12-08
      Tor 0.2.8.11 backports fixes for additional portability issues that
      could prevent Tor from building correctly on OSX Sierra, or with
      OpenSSL 1.1. Affected users should upgrade; others can safely stay
      with 0.2.8.10.
  4. Major Release 0.2.9.8

    Some points of interest to Whonix:

    • Deprecated features:
      • A number of DNS-cache-related sub-options for client ports are now deprecated for security reasons, and may be removed in a future version of Tor. (We believe that client-side DNS caching is a bad idea for anonymity, and you should not turn it on.) The options are: CacheDNS, CacheIPv4DNS, CacheIPv6DNS, UseDNSCache, UseIPv4Cache, and UseIPv6Cache.
        Does this impact https://phabricator.whonix.org/T567? (Nice job @HulaHoop & @Patrick)
    • Minor features (port flags):

      • Add new flags to the *Port options to give finer control over which requests are allowed. The flags are NoDNSRequest, NoOnionTraffic, and the synthetic flag OnionTrafficOnly, which is equivalent to NoDNSRequest, NoIPv4Traffic, and NoIPv6Traffic. Closes enhancement 18693; patch by "teor".
    • Minor features (controller):
      Some new control events. STATUS_SERVER may improve usability for hibernating laptop users.

    • Minor features (unix domain sockets):

      • When configuring a unix domain socket for a SocksPort, ControlPort, or Hidden service, you can now wrap the address in quotes, using C-style escapes inside the quotes. This allows unix domain socket paths to contain spaces. Resolves ticket 18753.
    • Minor bugfixes (client, unix domain sockets):

      • Disable IsolateClientAddr when using AF_UNIX backed SocksPorts as the client address is meaningless. Fixes bug 20261; bugfix on 0.2.6.3-alpha.

    BIg list! Will try out soon.

  5. Uploaded to Whonix jessie-proposed-updates and testers repository.

Continue the discussion forums.whonix.org

7 more replies

Participants