![]() ![]() There is nothing that a hidden service's operator can doto fix its clients' clocks. Demote the 'INTRODUCE2 cell is too ' log message to infolevel.Bugfix on 0.2.1.6-alpha fixes part of bug 2442. A normal Tor client can cause thatlog message during its normal operation. Demote the 'replay detected' log message emitted when a hiddenservice receives the same Diffie-Hellman public key in two differentINTRODUCE2 cells to info level.Bugfix on 0.2.0.7-alpha,when we decided to allow these config options to both be set. Correct the man page to explain that HashedControlPassword andCookieAuthentication can both be set, in which case either methodis sufficient to authenticate to Tor. Tor download softonic update#Update to the SeptemMaxmind GeoLite Country database.Minor bugfixes (documentation and log messages):.Add a VoteOnHidServDirectoriesV2 config option to allow directoryauthorities to abstain from voting on assignment of the HSDirconsensus flag.Change the default required uptime for a relay to be accepted asa HSDir (hidden service directory) from 24 hours to 25 hours.Improves on 0.2.0.10-alpha resolves ticket 2649.Adjust the expiration time on our SSL session certificates tobetter match SSL certs seen in the wild.Reported by Willem Pinckaers.Minor features: We thinkthat these attacks are infeasible (requiring the attacker to sendon the order of zettabytes of altered cells in a short interval),but we'd rather block them off in case there are any classes ofthis attack that we missed. This prevents a possible class of active attacksby an attacker who controls both an introduction point and arendezvous point, and who uses the malleability of AES-CTR toalter the encrypted g^x portion of the INTRODUCE1 cell. Check for replays of the public-key encrypted portion of anINTRODUCE1 cell, in addition to the current check for replays ofthe g^x value.Fixes bug3923 bugfix on 0.2.2.25-alpha.Minor features (security): Avoid an assertion failure when reloading a configuration withTrackExitHosts changes. ![]() Tor is simple, well organized and effective tool for anyone worried about security or invasions of privacy online. The Tor onion logo turns from yellow to green in your taskbar when a successful connection has been made. Connection can take some time depending on how many users are logged onto the network at any one time but usually its very quick. To check it's working, you can use the online "Tor detector" to see if you're surfing anonymously or not. If you want, you can also choose from various proxy tunnels based on a world map which displays exactly where each one is located. ![]() The Tor interface allows you to easily toggle it on and off based on when you need to go online anonymously - there's no need to restart your computer when you've done so. It works by bouncing traffic around a distributed network of servers which it calls "onion routers" (hence the logo). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |