Tor Browser 4.0 - Everything you need to safely browse the Internet
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
This release features important security updates to Firefox. Additionally, due to the POODLE attack, we have also disabled SSLv3 in this release.
The primary user-facing change since the 3.6 series is the transition to Firefox 31-ESR.
More importantly for censored users who were using 3.6, the 4.0 series also features the addition of three versions of the meek pluggable transport. In fact, we believe that both meek-amazon and meek-azure will work in China today, without the need to obtain bridge addresses. Note though that we still need to improve meek's performance to match other transports, though. so adjust your expectations accordingly. See tickets #12428, #12778, and #12857 for details.
This release also features an in-browser updater, and a completely reorganized bundle directory structure to make this updater possible. This means that simply extracting a 4.0 Tor Browser over a 3.6.6 Tor Browser will not work. Please also be aware that the security of the updater depends on the specific CA that issued the www.torproject.org HTTPS certificate (Digicert), and so it still must be activated manually through the Help ("?") "about browser" menu option. Very soon, we will support both strong HTTPS site-specific certificate pinning (ticket #11955) and update package signatures (ticket #13379). Until then, we do not recommend using this updater if you need stronger security and normally verify GPG signatures.
There are also a couple behavioral changes relating to NoScript since 3.6. In particular, by default it now enforces script enable/disable for all sub-elements of a page, so you only need to enable scripts once for a page to work, rather than enabling many sub-scripts. This will hopefully make it possible for more people to use the "High Security" setting in our upcoming Security Slider, which will have Javascript disabled globally via NoScript by default. While we do not recommend per-element whitelisting due to fingerprinting, users who insist on keeping this functionality may wish to check out RequestPolicy.
Note to MacOS users: We intend to deprecate 32bit OSX bundles very soon. If you are still using 32bit OSX 10.6, you soon will need to either update your OS to a later version, or begin using the Tails live operating system.
Here is the changelog since 4.0-alpha-3:
- All Platforms
- Update Firefox to 31.2.0esr
- Update Torbutton to 1.7.0.1
- Bug 13378: Prevent addon reordering in toolbars on first-run.
- Bug 10751: Adapt Torbutton to ESR31's Australis UI.
- Bug 13138: ESR31-about:tor shows "Tor is not working"
- Bug 12947: Adapt session storage blocker to ESR 31.
- Bug 10716: Take care of drag/drop events in ESR 31.
- Bug 13366: Fix cert exemption dialog when disk storage is enabled.
- Update Tor Launcher to 0.2.7.0.1
- Translation updates only
- Udate fteproxy to 0.2.19
- Update NoScript to 2.6.9.1
- Bug 13027: Spoof window.navigator useragent values in JS WebWorker threads
- Bug 13016: Hide CSS -moz-osx-font-smoothing values.
- Bug 13356: Meek and other symlinks missing after complete update.
- Bug 13025: Spoof screen orientation to landscape-primary.
- Bug 13346: Disable Firefox "slow to start" warnings and recordkeeping.
- Bug 13318: Minimize number of buttons on the browser toolbar.
- Bug 10715: Enable WebGL on Windows (still click-to-play via NoScript)
- Bug 13023: Disable the gamepad API.
- Bug 13021: Prompt before allowing Canvas isPointIn*() calls.
- Bug 12460: Several cross-compilation and gitian fixes (see child tickets)
- Bug 13186: Disable DOM Performance timers
- Bug 13028: Defense-in-depth checks for OCSP/Cert validation proxy usage
- Bug 13416: Defend against new SSLv3 attack (poodle).
Here is the list of all changes in the 4.0 series since 3.6.6:
- All Platforms
- Update Firefox to 31.2.0esr
- Udate fteproxy to 0.2.19
- Update Tor to 0.2.5.8-rc (from 0.2.4.24)
- Update NoScript to 2.6.9.1
- Update Torbutton to 1.7.0.1 (from 1.6.12.3)
- Bug 13378: Prevent addon reordering in toolbars on first-run.
- Bug 10751: Adapt Torbutton to ESR31's Australis UI.
- Bug 13138: ESR31-about:tor shows "Tor is not working"
- Bug 12947: Adapt session storage blocker to ESR 31.
- Bug 10716: Take care of drag/drop events in ESR 31.
- Bug 13366: Fix cert exemption dialog when disk storage is enabled.
- Update Tor Launcher to 0.2.7.0.1 (from 0.2.5.6)
- Bug 11405: Remove firewall prompt from wizard.
- Bug 12895: Mention @riseup.net as a valid bridge request email address
- Bug 12444: Provide feedback when “Copy Tor Log” is clicked.
- Bug 11199: Improve error messages if Tor exits unexpectedly
- Bug 12451: Add option to hide TBB's logo
- Bug 11193: Change "Tor Browser Bundle" to "Tor Browser"
- Bug 11471: Ensure text fits the initial configuration dialog
- Bug 9516: Send Tor Launcher log messages to Browser Console
- Bug 13027: Spoof window.navigator useragent values in JS WebWorker threads
- Bug 13016: Hide CSS -moz-osx-font-smoothing values.
- Bug 13356: Meek and other symlinks missing after complete update.
- Bug 13025: Spoof screen orientation to landscape-primary.
- Bug 13346: Disable Firefox "slow to start" warnings and recordkeeping.
- Bug 13318: Minimize number of buttons on the browser toolbar.
- Bug 10715: Enable WebGL on Windows (still click-to-play via NoScript)
- Bug 13023: Disable the gamepad API.
- Bug 13021: Prompt before allowing Canvas isPointIn*() calls.
- Bug 12460: Several cross-compilation and gitian fixes (see child tickets)
- Bug 13186: Disable DOM Performance timers
- Bug 13028: Defense-in-depth checks for OCSP/Cert validation proxy usage
- Bug 4234: Automatic Update support (off by default)
- Bug 11641: Reorganize bundle directory structure to mimic Firefox
- Bug 10819: Create a preference to enable/disable third party isolation
- Bug 13416: Defend against new SSLv3 attack (poodle).
- Windows:
- Bug 10065: Enable DEP, ASLR, and SSP hardening options
- Linux:
- Bug 13031: Add full RELRO hardening protection.
- Bug 10178: Make it easier to set an alternate Tor control port and password
- Bug 11102: Set Window Class to "Tor Browser" to aid in Desktop navigation
- Bug 12249: Don't create PT debug files anymore
The list of frequently encountered known issues is also available in our bug tracker.
Tor Browser 4.0 - Everything you need to safely browse the Internet
Reviewed by 0x000216
on
Thursday, October 16, 2014
Rating: 5