Tor 项目正在转向 Rust,放弃 C。
The Tor Project is switching to Rust

原始链接: https://itsfoss.com/news/tor-rust-rewrite-progress/

Tor 项目正在积极使用 Rust(名为“Arti”)重写其核心软件,以解决原始 C 代码库中固有的安全漏洞,特别是缓冲区溢出和内存损坏问题。最新版本 Arti 1.8.0 专注于增强用户隐私和改进功能。 一项关键更新是对电路超时机制的重构,从可预测的单个计时器转变为基于使用情况的随机计时器。此更改旨在阻止流量监控并降低用户指纹识别的风险。 此外,Arti 1.8.0 引入了一个实验性工具,允许洋葱服务运营商无缝地将授权密钥从较旧的基于 C 的 Tor 迁移到 Arti 的安全密钥存储。该版本还包括对路由、协议实现和配置选项的各种改进,标志着 Tor 网络 Rust 化进程的重大进展。

Hacker News 新闻 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 Tor 项目正在转向 Rust,放弃 C (itsfoss.com) 30 分,由 giuliomagnifico 发表于 24 分钟前 | 隐藏 | 过去 | 收藏 | 2 条评论 epolanski 发表于 5 分钟前 | 下一个 [–] 如果 Rust 能解决他们的问题并且他们喜欢 Rust,这似乎很合理。 这正是我们拥有不同语言和工具的原因,因为它们对不同的项目、团队和问题有不同的适应性。 但一旦陷入“工具 X 更好”的无聊争论,就会失去选择适合工作的正确工具的细微差别。回复 jjgreen 发表于 1 分钟前 | 上一个 [–] 完全重写总是坏主意……[喃喃自语的同意]……除了用 Rust![欢呼] 回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文
Warp Terminal

The Tor Project has been busy with the rustification of their offering for quite some time now.

If you have used Tor Browser, you know what it does. Anonymous browsing through encrypted relay chains. The network itself has been running since the early 2000s. All of it is built on C.

But that C codebase is an issue. It is known to have buffer overflows, use-after-free bugs, and memory corruption vulnerabilities. That is why they introduced Arti, a Rust rewrite of Tor that tackles these flaws by leveraging the memory safety of the programming language.

A new release of Arti just dropped last week, so let's check it out!

arti is written in a shade of light green in the center, with four circles surrounding it
Source: The Tor Project

We begin with the main highlight of this release, the rollout of the circuit timeout rework that was laid out in proposal 368. Tor currently uses something called Circuit Dirty Timeout (CDT). It is a single timer that controls when your connection circuits become unavailable and when they close down.

Unfortunately, it is predictable. Someone monitoring traffic can spot these patterns and potentially track your activity. Arti 1.8.0 fixes this by implementing usage-based timeouts with separate timers. One handles when circuits accept new connections. Another closes idle circuits at random times instead of fixed intervals.

This should reduce the risk of fingerprinting from predictable timeout behavior.

Next up is the new experimental arti hsc ctor-migrate command that lets onion service operators migrate their restricted discovery keys from the C-based Tor to Arti's keystore.

These keys handle client authorization for onion services. The command transfers them over without requiring operators to do the manual legwork. The release also delivers improvements for routing architecture, protocol implementation, directory cache support, and OR port listener configuration.

You can go through the changelog to learn more about the Arti 1.8.0 release.

Via: Sam Bent

Suggested Read 📖: Is Helium the Browser Brave Was Meant to Be?

Is Helium the Browser Brave Was Meant to Be?

An in-depth look at ’another new Chromium-based web browser” that is “different from the other Chromium-based web browsers”.

联系我们 contact @ memedata.com