Tor Browser 5.0a3 is released
The Tor Browser Team is proud to announce the first alpha released based on Firefox 38 ESR.
As such, this release features many updates to Firefox (including several security updates), as well as to our build system and dependencies. For this release, we performed a thorough network and feature review of Firefox 38, and fixed the most pressing privacy issues, as well as all Tor proxy safety issues that we discovered during the audit.
We also updated our toolchain on OS X to use the OS X 10.7 SDK. For Linux and Windows we switched to GCC 5.1 as our new (cross)-compiler. We are therefore especially interested in feedback if there are stability issues or broken Tor Browser bundles due to these toolchain upgrades.
Besides Firefox 38 and build system changes, we also updated several components. Most notably, we bumped OpenSSL to version 1.0.1o, NoScript to version 2.6.9.27 and Torbutton to version 1.9.3.0. Included as well is a backported Tor patch to improve usability on websites, and we fixed a crash bug impacting users with the security slider level set to "High".
Here is the complete changelog since 5.0a2
- All Platforms
- Update Firefox to 38.1.0esr
- Update OpenSSL to 1.0.1o
- Update NoScript to 2.6.9.27
- Update meek to 0.20
- Update Torbutton to 1.9.3.0
- Bug 16403: Set search parameters for Disconnect
- Bug 14429: Make sure the automatic resizing is enabled
- Bug 16427: Use internal update URL to block updates (instead of
127.0.0.1) - Bug 16200: Update Cache API usage and prefs for FF38
- Bug 16357: Use Mozilla API to wipe permissions db
- Translation updates
- Update Tor Launcher to 0.2.6.7
- Bug 16428: Use internal update URL to block updates (instead of
127.0.0.1) - Bug 15145: Visually distinguish "proxy" and "bridge" screens.
- Translation updates
- Bug 16428: Use internal update URL to block updates (instead of
- Bug 16430: Allow DNS names with _ characters in them (fixes
nytimes.com) (Tor patch backport) - Bug 13247: Fix meek profile error after bowser restarts
- Bug 16397: Fix crash related to disabling SVG
- Bug 16403: Set search parameters for Disconnect
- Bug 16446: Update FTE bridge #1 fingerprint
- Bug 15646: Prevent keyboard layout fingerprinting in KeyboardEvent
- Bug 16005: Relax WebGL minimal mode
- Bug 16300: Isolate Broadcast Channels to first party
- Bug 16439: Remove Roku screencasting code
- Bug 16285: Disabling EME bits
- Bug 16206: Enforce certificate pinning
- Bug 13670: Isolate OCSP requests by first party domain
- Bug 16448: Isolate favicon requests by first party
- Bug 7561: Disable FTP request caching
- Bug 6503: Fix single-word URL bar searching
- Bug 15526: ES6 page crashes Tor Browser
- Bug 16254: Disable GeoIP-based search results
- Bug 16222: Disable WebIDE to prevent remote debugging and addon
downloads. - Bug 13024: Disable DOM Resource Timing API
- Bug 16340: Disable User Timing API
- Bug 14952: Disable HTTP/2
- Mac OS
- Use OSX 10.7 SDK
- Bug 16253: Tor Browser menu on OS X is broken with ESR 38
- Build System
- Bug 16351: Upgrade our toolchain to use GCC 5.1
- Bug 15772 and child tickets: Update build system for Firefox 38
Comments
Please note that the comment area below has been archived.
Youtube video failing to
Youtube video failing to load with this release.
also a reproducible crash when temporary allowing noscript on youtube.
youtube video fails to load
youtube video fails to load with any security level.
reproducible crash when allowing scripts if security level ≠ low.
Same here. Youtube videos
Same here. Youtube videos are not playing anymore.
Did upgrade on PCLinuxOS
Did upgrade on PCLinuxOS 32-bit using KDE. Now certain sites say Java Script needs to be enabled but nothing I do with NoScript, including disabling it, enables Java Script.
So how do I enable Java Script even when NoScript disabled?
I get no audio on PCLinuxOS
I get no audio on PCLinuxOS 32-bit. Played with all the Pulse Audio, etc, settings I could thinks of.
Great update, hope the audit
Great update, hope the audit was thorough enough!
why is now yahoo search set
why is now yahoo search set by default?
Is it? I would hope it's
Is it? I would hope it's still Disconnect?
It's set to Yahoo! search by
It's set to Yahoo! search by default. Doesn't matter, it's an alpha release anyway :)
Here's our ticket to fix
Here's our ticket to fix this:
https://trac.torproject.org/projects/tor/ticket/16522
Mine was set to what I had
Mine was set to what I had in the previous release, which was DDG. Not sure if it makes any difference, but maybe you didn't update through the browser like I did?
No link to the distribution
No link to the distribution dir in the post: https://dist.torproject.org/torbrowser/5.0a3/
It's gotten really slower
It's gotten really slower and stopped showing pictures on twitter
I can confirm problems on
I can confirm problems on Twitter (no pictures shown), also I'm not able to right-click on Twitter and see the context menu and it always shows the cookie warning on top of the page.
Confirmation - no pictures
Confirmation - no pictures on Twitter. Also tweet button does not show up, and am unable to use the search function on twitter.
https://bugs.torproject.org/1
https://bugs.torproject.org/16528
No download link?
No download link?
Is there a way to choose
Is there a way to choose which permissions to allow within NoScript, rather than what I assume is more-or-less just white-listing a whole page?I used to be able to block specific elements/objects. I think you've raised concerns about fingerprinting before, but I'm more worried about executable content I can't control. The following is an issue regarding NS white-listing,
http://net-security.org/secworld.php?id=18579 but it's loosely tied to my concerns Thank You
Download
Download here:
https://www.torproject.org/projects/torbrowser.html.en#downloads-alpha
can't watch youtube videos
can't watch youtube videos and why is the bottom of the browser transparent?
Great update. Ignore the
Great update. Ignore the whining above - runs fast, no problems.
Agree that white-listing by element would be preferable as a standard setting in the browser, rather than temporarily allowing all scripts. Also preferable to have Clearclick protection set on trusted and untrusted pages by default, since this is Tor Browser and not Chrome ;-)
Great that the base has been updated to FF38. Once full sandboxing is completed (can Mozilla move that along already?), then this browser will be simply great from a security standpoint.
Also, I'm sure SSL observatory is turned off for a good security reason, but I read on Schneier's blog that the option to submit and check CAs signed by non-standard root CAs can make it much harder for the Stasi for some reason (can't recall right now why).
Anyway, I'm sure your developers are all over this, and the millions who use your software to have a semblance of privacy truly appreciate your hard work and amazing coding skills!
BIG Thank you to the
BIG Thank you to the developers, as always :-)
Unfortunately this time when I download any file from anywhere the download-window doesnt update itself.
Means, whenever I start a download the progress bar stops immediately while the download itself works. Minor problem , but annoying....
I think this might be an
I think this might be an intentional design in Firefox.
I go to about:downloads when I want to see status. There's probably something to click on somewhere too.
(Not OP) No, I think it's a
(Not OP)
No, I think it's a bug. I noticed I couldn't get downloads to work either and the terminal was spitting out:
*************************
A coding exception was thrown and uncaught in a Task.
Full message: TypeError: gDownloadLastDir is undefined
Full stack: nsUnknownContentTypeDialog.prototype.promptForSaveToFileAsync/<@resource://gre/components/nsHelperAppDlg.js:295:7
TaskImpl_run@resource://gre/modules/Task.jsm:330:41
Handler.prototype.process@resource://gre/modules/Promise.jsm -> resource://gre/modules/Promise-backend.js:867:23
this.PromiseWalker.walkerLoop@resource://gre/modules/Promise.jsm -> resource://gre/modules/Promise-backend.js:746:7
this.PromiseWalker.scheduleWalkerLoop/<@resource://gre/modules/Promise.jsm -> resource://gre/modules/Promise-backend.js:688:37
*************************
I was trying to download a asc file from this website. Trying it in other places also doesn't work. I hope that's enough info for you to figure it out.
Thanks for all your work.
It would be best if you open
It would be best if you open this as a ticket on trac.torproject.org. Otherwise the Tor Browser devs may or may not notice this comment. Thanks!
Is the infinite Captcha bug
Is the infinite Captcha bug solved?
I thought that was just me &
I thought that was just me & my inability to decipher gibberish. Incredibly frustrating since seemingly every webmaster has jumped onto the Cloudflare bandwagon.
The only way I've been able to get around it is to enable Javascript and cookies, which is something I am very uncomfortable doing.
Seriously, Cloudflare can go F*** itself.
The update system is fast
The update system is fast and saves a lot of time also. Using tor
nowadays is like ridding a bike, all you need is some sense of equilibrium
to get through the shit load of disinformation flying around it.
This blog still is the best place to go before a ride.
Thanks all for keeping us updated and informed.
OpenSSL to Patch Undisclosed
OpenSSL to Patch Undisclosed High Severity Vulnerability this Thursday
http://thehackernews.com/2015/07/openssl-vulnerability-patch.html
Yes! Never a dull moment.
Yes! Never a dull moment.
http://www.democracynow.org/2
http://www.democracynow.org/2015/7/8/the_end_of_encryption_nsa_fbi because... Freedumb & Turr'rists.
^Relevant Feature about 30 minutes in.
Have you looked into
Have you looked into Libressl instead? They are way ahead of Openssl on fixing most vulnerabilities.
Many governments fund this
Many governments fund this project you know?
You might
You might enjoy
https://www.torproject.org/about/sponsors
and
https://www.torproject.org/about/financials
If you want to look into a
If you want to look into a Tor alternative, look into the new Astoria browser which is trying to focus on anti-NSA tactics. Astoria will be for hardcore anonymity that Tor cannot achieve.
I recommend you read the
I recommend you read the Astoria paper and talk to the researchers. There *is* no Astoria browser, and it is not trying to compete with Tor. It's just a submitted research paper exploring the security implications of alternative path selection.
(It is worthwhile and useful research, but it has been way misunderstood in the popular press.)
How safe is it to use Whonix
How safe is it to use Whonix with Tor on a Windows machine? Compared to Tails
What is the default TBB
What is the default TBB screen size supposed to be and how can I check?
why map of URLs only work
why map of URLs only work sometime?
I'm having trouble making
I'm having trouble making twitter accounts still. Please fix this, they seem to know I'm using Tor browser right away and auto ask for my phone number.
What's there to fix? Tor by
What's there to fix? Tor by design doesn't hide the fact that you are using Tor from the destination (and realistically can't). This seems like something you need to take up with Twitter more than anything that can be fixed on the Tor side of things.
Why are TOR ips public? Is
Why are TOR ips public? Is it because of funding or is there another reason like security/openness etc.?
The simple answer is that
The simple answer is that they cannot be used by users yet still remain secret. Users need to know what relays are in the network in order to use them. You could imagine designs that try to only reveal the entry points, and not reveal the exit relays (which is what most people asking this question are hoping to hide), but then I can run my own website, and visit it repeatedly, and make a list of all the addresses that connect to them.
Here's the more complete answer:
https://www.torproject.org/docs/faq#HideExits