[guardian-dev] Orbot v11 RC6 (with Tor 0.2.3.23-RC) is out!

Nathan of Guardian nathan at guardianproject.info
Fri Oct 26 06:28:42 EDT 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


After previous fits and starts, we've stabilized Orbot v11 now with
the RC6 release. Our core testers and public users via the Google Play
distribution are back to happy and stable states of being.

The latest version can be found:

1) In Google Play:
https://play.google.com/store/apps/details?id=org.torproject.android

2) In our F-Droid repo:
https://guardianproject.info/2012/03/15/our-new-f-droid-app-repository/

3) Our via direct APK here:
https://guardianproject.info/releases/Orbot-release-0.2.3.23-rc-1.0.11-RC6.apk
(.asc)

As always you can file bugs on trac.torproject.org or the guardian
tracker: https://dev.guardianproject.info/projects/orbot/issues/new

A few things I learned during this latest Orbot effort:

- - 0.2.4.*-alpha is not stable yet on Android, causing a variety of
to-be-debugged issues. Based on that, we rolled back to 0.2.3.23-RC
for this release. We may still do a final/stable v11 release once Tor
0.2.3.* is declared stable.

- - Android has a "Strict Mode" feature that can sometimes cause halts,
exits at various points based on certain types of undesirable
behaviour, like accessing the network on a main thread. The new
up/down data stats inadvertently accessed the localhost Tor control
port on the main thread. Most devices just have it set to log a
warning to the debug output, but on a few devices it made things go boom.

- - We needed to rewrite our iptables rules quite a bit to use a
separate user defined chain "ORBOT" with a jump point in OUTPUT chain.
This allows us to easily flush all ORBOT rules. We realized this was
necessary because as some devices switch between 3G and wifi
connections, iptables rules are reapplied automatically causing
multiple instances of the same rule. Only a flush can clear all of
instances of these out easily. Second, we can't do a global iptables
- --flush because it not only removes some rules set by other apps, it
also appears to knock out internet connectivity/routing completely on
some newer devices, based on some required default rules that are in
place.

- - With the increasing bountiful diversity of Android devices,
firmwares and operating system versions, it continues to be a burden
to solve all issues for all people. However, most of the issues are
related to our "root" and transproxy features, and not the core Orbot
app features or bundled Tor binary. We are eager to move to a
user-defined/soft VPN model to support transparent proxying in the v12
release, and move away from utilizing root in any manner.

That's all for now.

+n8fr8
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=1tx8
-----END PGP SIGNATURE-----


More information about the Guardian-dev mailing list