After being in development for the past several months, Tor 0.3.0.6 is now the latest stable version of the software, introducing a bunch of new features and improvements. The most prominent one being the revamp of the guard selection algorithm to better resist guard-capture attacks by hostile local networks.
The Tor 0.3.0 stable series also deprecates the use of old RSA1024 keys for both relays and clients, which now make use of Ed25519 keys to authenticate their link connections to relays. As such, the default for AuthDirPinKeys is now 1, and it looks like circuit crypto has been Curve25519-authenticated.
"By default, this is controlled by a consensus parameter, currently disabled. You can turn this feature on for testing by setting ExtendByEd... (read more)
from Softpedia News / Linux http://ift.tt/2pG1i8Q
via IFTTT
No comments:
Post a Comment