{"id":130,"date":"2014-10-23T21:40:01","date_gmt":"2014-10-23T21:40:01","guid":{"rendered":"http:\/\/blogs.gentoo.org\/blueness\/?p=130"},"modified":"2016-04-02T15:27:35","modified_gmt":"2016-04-02T15:27:35","slug":"tor-ramdisk-20141022-released","status":"publish","type":"post","link":"https:\/\/blogs.gentoo.org\/blueness\/2014\/10\/23\/tor-ramdisk-20141022-released\/","title":{"rendered":"Tor-ramdisk 20141022 released"},"content":{"rendered":"<p>Following the latest and greatest exploit in openssl, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-3566\" target=\"_blank\">CVE-2014-3566<\/a>, aka the POODLE issue, the tor team released version 0.2.4.25.\u00a0 For those of you not familiar, <a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\">tor<\/a> is a system of online anonymity which encrypts and bounces your traffic through relays so as to obfuscated the origin.\u00a0 Back in 2008, I started a uClibc-based micro Linux distribution, called <a href=\"http:\/\/opensource.dyc.edu\/tor-ramdisk\" target=\"_blank\">tor-ramdisk<\/a>, whose only purpose is to host a tor relay in hardened Gentoo environment purely in RAM.<\/p>\n<p>While the POODLE bug is an openssl issue and is resolved by the latest release 1.0.1j, the tor team decided to turn off the affected protocol, SSL v3 or TLS 1.0 or later.\u00a0 They also fixed tor to avoid a crash when built using openssl 0.9.8zc, 1.0.0o, or 1.0.1j, with the &#8216;no-ssl3&#8217; configuration option.\u00a0 These important fixes to two major components of tor-ramdisk waranted a new release.\u00a0 Take a look at the upstream <a href=\"https:\/\/gitweb.torproject.org\/tor.git\/blob\/6b2ed1a905ce2ca50a480d319368b676de124d6d:\/ReleaseNotes\" target=\"_blank\">ChangeLog<\/a> for more information.<\/p>\n<p>Since I was upgrading stuff, I also upgrade the kernel to vanilla 3.17.1 + Gentoo&#8217;s hardened-patches-3.17.1-1.extras.\u00a0 All the other components remain the same as the previous release.<\/p>\n<p>i686:<br \/>\nHomepage: <a href=\"\/\/opensource.dyc.edu\/tor-ramdisk\" target=\"_blank\">http:\/\/opensource.dyc.edu\/tor-ramdisk<\/a><br \/>\nDownload:\u00a0<a href=\"http:\/\/opensource.dyc.edu\/tor-ramdisk-downloads\" target=\"_blank\">http:\/\/opensource.dyc.edu\/tor-ramdisk-downloads<\/a><\/p>\n<p>x86_64:<br \/>\nHomepage: <a href=\"http:\/\/opensource.dyc.edu\/tor-x86_64-ramdisk\" target=\"_blank\">http:\/\/opensource.dyc.edu\/tor-x86_64-ramdisk<\/a><br \/>\nDownload:\u00a0 <a href=\"http:\/\/opensource.dyc.edu\/tor-x86_64-ramdisk-downloads\" target=\"_blank\">http:\/\/opensource.dyc.edu\/tor-x86_64-ramdisk-downloads<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following the latest and greatest exploit in openssl, CVE-2014-3566, aka the POODLE issue, the tor team released version 0.2.4.25.\u00a0 For those of you not familiar, tor is a system of online anonymity which encrypts and bounces your traffic through relays so as to obfuscated the origin.\u00a0 Back in 2008, I started a uClibc-based micro Linux &hellip; <a href=\"https:\/\/blogs.gentoo.org\/blueness\/2014\/10\/23\/tor-ramdisk-20141022-released\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Tor-ramdisk 20141022 released&#8221;<\/span><\/a><\/p>\n","protected":false},"author":141,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1,3],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/posts\/130"}],"collection":[{"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":4,"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/posts\/130\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/blueness\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}