[HOME] [DOWNLOAD] [DOCS] [NEWS] [SUPPORT] [TIPS] [ISSUES] [DONATE]

Testers Wanted! Tor - Stable Upgrades

Originally published at: https://www.whonix.org/blog/testers-wanted-tor-stable-upgrades

Tor was updated to 0.2.8.10 in Whonix stable-proposed-updates as well as in testers repository.

Instructions for changing Whonix repository:
https://www.whonix.org/wiki/Whonix-APT-Repository

Then just do a update:
https://www.whonix.org/wiki/Update

Will switching to stable-proposed-updates get rid of the repository size report warnings?

Tested briefly on Virtualbox-Whonix. No obvious issues.

When was 0.2.8.10-rc announced and how? I don’t see any announcement on tor-announce or tor-talk. I wouldn’t want to add jessie-proposed-updates to my stable machines and I don’t want to check constantly if there are new versions on a test machine. But I’d like to test before stable release - and maybe switch my repo back deb.torproject.org.

1 Like

No. Not required, but getting rid of that can be done by changing repository uri as explained here:
Size of file dists_jessie_main_binary-amd64_Packages.gz is not what the server reported

In that case you can try anon-shared-build-apt-sources-tpo.

sudo apt-get install anon-shared-build-apt-sources-tpo

It will add torproject signing key as well as the deb.torproject.org repository.

After that, I also recommend sudo apt-get install deb.torproject.org-keyring.

Not sure all stable upgrade have an rc or rc announcement?

0.2.8.11 released but seems optional for Whonix:

Changes in version 0.2.8.11 - 2016-12-08
  Tor 0.2.8.11 backports fixes for additional portability issues that
  could prevent Tor from building correctly on OSX Sierra, or with
  OpenSSL 1.1. Affected users should upgrade; others can safely stay
  with 0.2.8.10.
1 Like

entr0py:

0.2.8.11 released but seems optional for Whonix:

Changes in version 0.2.8.11 - 2016-12-08
  Tor 0.2.8.11 backports fixes for additional portability issues that
  could prevent Tor from building correctly on OSX Sierra, or with
  OpenSSL 1.1. Affected users should upgrade; others can safely stay
  with 0.2.8.10.

Yes, no need to bother with that one.

Merged into Whonix stable (jessie) repository.

I can test alpha, beta and rc releases.

Major Release 0.2.9.8

Some points of interest to Whonix:

  • Deprecated features:

    • A number of DNS-cache-related sub-options for client ports are now deprecated for security reasons, and may be removed in a future version of Tor. (We believe that client-side DNS caching is a bad idea for anonymity, and you should not turn it on.) The options are: CacheDNS, CacheIPv4DNS, CacheIPv6DNS, UseDNSCache, UseIPv4Cache, and UseIPv6Cache.
      Does this impact https://phabricator.whonix.org/T567? (Nice job @HulaHoop & @Patrick)
  • Minor features (port flags):

    • Add new flags to the *Port options to give finer control over which requests are allowed. The flags are NoDNSRequest, NoOnionTraffic, and the synthetic flag OnionTrafficOnly, which is equivalent to NoDNSRequest, NoIPv4Traffic, and NoIPv6Traffic. Closes enhancement 18693; patch by “teor”.
  • Minor features (controller):
    Some new control events. STATUS_SERVER may improve usability for hibernating laptop users.

  • Minor features (unix domain sockets):

    • When configuring a unix domain socket for a SocksPort, ControlPort, or Hidden service, you can now wrap the address in quotes, using C-style escapes inside the quotes. This allows unix domain socket paths to contain spaces. Resolves ticket 18753.
  • Minor bugfixes (client, unix domain sockets):

    • Disable IsolateClientAddr when using AF_UNIX backed SocksPorts as the client address is meaningless. Fixes bug 20261; bugfix on 0.2.6.3-alpha.

BIg list! Will try out soon.

2 Likes

upload Tor 0.2.9.8
https://phabricator.whonix.org/T584

Uploaded to Whonix jessie-proposed-updates and testers repository.

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Investors] [Priority Support] [Professional Support]