Monday, December 15, 2008

Tor + Bundles

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Changes in version - 2008-12-08
Major features:

•New DirPortFrontPage option that takes an html file and publishes
it as "/" on the DirPort. Now relay operators can provide a
disclaimer without needing to set up a separate webserver. There's
a sample disclaimer in contrib/tor-exit-notice.html.
Security fixes:

•When the client is choosing entry guards, now it selects at most
one guard from a given relay family. Otherwise we could end up with
all of our entry points into the network run by the same operator.
Suggested by Camilo Viecco. Fix on
Major bugfixes:

•Fix a DOS opportunity during the voting signature collection process
at directory authorities. Spotted by rovv. Bugfix on 0.2.0.x.
•Fix a possible segfault when establishing an exit connection. Bugfix
Minor bugfixes:

•Get file locking working on win32. Bugfix on Fixes
bug 859.
•Made Tor a little less aggressive about deleting expired
certificates. Partial fix for bug 854.
•Stop doing unaligned memory access that generated bus errors on
sparc64. Bugfix on Fix for bug 862.
•Fix a crash bug when changing EntryNodes from the controller. Bugfix
on Fix for bug 867. Patched by Sebastian.
•Make USR2 log-level switch take effect immediately. Bugfix on
•If one win32 nameserver fails to get added, continue adding the
rest, and don't automatically fail.
•Use fcntl() for locking when flock() is not available. Should fix
compilation on Solaris. Should fix Bug 873. Bugfix on
•Do not mark smartlist_bsearch_idx() function as ATTR_PURE. This bug
could make gcc generate non-functional binary search code. Bugfix
•Build correctly on platforms without socklen_t.
•Avoid potential crash on internal error during signature collection.
Fixes bug 864. Patch from rovv.
•Do not use C's stdio library for writing to log files. This will
improve logging performance by a minute amount, and will stop
leaking fds when our disk is full. Fixes bug 861.
•Stop erroneous use of O_APPEND in cases where we did not in fact
want to re-seek to the end of a file before every last write().
•Correct handling of possible malformed authority signing key
certificates with internal signature types. Fixes bug 880. Bugfix
•Fix a hard-to-trigger resource leak when logging credential status.
CID 349.

11 December 2008: Tor im Browser 1.1.7 (Multilanguage Firefox + Tor) Latest Firefox Shiretoko;O=D

09 December 2008: Tor Alpha + Vidalia Bundle;O=D

05 December 2008: Tor released as stable.

Latest Privoxy 3.0.10 (stable)


By Morph , Spike2 based eMule mods in HttpDownloadDlg.cpp
// MORPH START, send user agent as firefox if obfuscated....

used by enabled protocol obfuscation
are all UA Strings Firefox 1.5 Italian language ( Can cause more often a Low ID by svr login and ISP and others can figure out in non Italian regions that it's emule with protocol obfuscation enabled )

Some mods send a invalid UA string by enabled protocol obfuscation. Close the String with ) is missing: SharkX for example _T("Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;")
(thePrefs.IsClientCryptLayerRequested()?_T("Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;")
-> (thePrefs.IsClientCryptLayerRequested()?_T("Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)")

Changes can be done: by using different UA strings/Mod:

Firefox 3.1 beta 2 lang de

thePrefs.IsClientCryptLayerRequested()?_T("Mozilla/5.0 (Windows; U; Windows NT 5.1; de-DE; rv:1.9.1b2) Gecko/20081125 Firefox/3.1b2")

MS IE 6.0 on XP
(thePrefs.IsClientCryptLayerRequested()?_T("Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)")

Firefox 2.0 lang en-us
(thePrefs.IsClientCryptLayerRequested()?_T("Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv: Gecko/20080702 Firefox/")

No comments:

Post a Comment