1 [[!meta date="2011-03-02 00:46:14 +0100"]]
2 [[!meta title="Bimonthly report: January and February 2011"]]
5 We are pleased to present you the first Tails bimonthly report ever.
7 This is a first try that may, or may not, be followed by others
8 depending on the feedback we get: if you like reading such news about
9 Tails, don't hesitate [[telling us|support/talk]]!
11 This report sums up the work that was done on Tails in January and
16 # Helping third-parties do security analyses of Tails
18 We finished writing and published the [[Tails design
19 document|contribute/design]] that presents a specification of a
20 *Privacy Enhancing Live Distribution* (PELD) as well as the Tails
21 actual implementation.
23 By writing this document we intend to help third-parties do security
24 analyses of any given PELD and specifically of Tails. We also wish to
25 help establish best practices in the field of PELD design and
26 implementation, and thus raise the baseline for all similar projects
29 Reviews of this document and audits of Tails are most welcome.
31 # Preparing next release
33 The next Tails release, which will be called 0.7, is based on the
34 newly released Debian Squeeze. It has been feature freezed recently
35 and is now being tested in a wild, unsuspecting world; if it survives,
36 we can bet it will be the best Tails release ever... until 0.8 is out
39 Protecting against memory recovery
40 ----------------------------------
42 A new, safer way to wipe memory on shutdown was implemented. It is now
43 also used when the boot media is physically removed: in an emergency
44 situation, one can grab her Tails Live USB stick or Live CD and leave
45 while the system will quickly erase her traces from the computer's
46 memory and shut it down.
48 Making Tails easier to use
49 --------------------------
51 We enhanced the onBoard virtual keyboard; patches were obviously
54 The Tails user interface was improved in several other ways: hiding
55 some useless GNOME preference menu items, using a background that does
56 not overlap with the bootloader menu, adding a shutdown button to the
57 right of the top GNOME panel (nice idea stolen from Ubuntu).
59 Other noteworthy enhancements
60 -----------------------------
62 A fix for a virtual keyboard critical bug was prepared, amongst the
63 ton of usual release preparation work.
65 TrueCrypt can be optionally installed at boot time; we may not want to
66 include TrueCrypt forever, but we at the very least we want to provide
67 a migration path from TrueCrypt volumes created by good old Incognito
70 The [HTTPS Everywhere](https://www.eff.org/https-everywhere) Iceweasel
71 extension is now installed.
73 Queries to DNS resolvers on the LAN are [[now
74 forbidden|todo/forbid_lan_dns_queries]].
76 Writing our [[design document|contribute/design]] made us think more
77 thoroughly various parts of the Tails configuration and enhance many
78 parts of it. Moreover, we compared it with the [Tor Browser
79 Bundle](https://www.torproject.org/projects/torbrowser.html.en)
80 configuration, picked many nice ideas from there, and generally made
81 Tails configuration more similar to the TBB's one, which shall ease
82 peer review and enlarge the anonymity set Tails users are part of. A
83 notable example is the enabling of US English browser spoofing in
86 The HTP time synchronization system is now more robust wrt. network
89 GNOME automatic media mounting and opening was disabled to protect
90 against a class of attacks that was recently put under the spotlights.
94 Tails was added to a couple spots on the Tor website:
96 - https://www.torproject.org/projects/projects.html.en
97 - https://www.torproject.org/getinvolved/volunteer.html.en#Projects
99 We discussed various funding and sponsoring opportunities; we have
101 projects](https://www.torproject.org/getinvolved/volunteer.html#project-tails)
102 that shall be submitted under the Tor Project umbrella for the Google
103 Summer of Code and other summer intership programs. [One of
104 those](https://www.torproject.org/getinvolved/volunteer.html#tailsDebianLive).
106 We have participated in the Debian Derivatives Census initiative
107 ([[!debwiki Derivatives/Census]]): Tails now has a dedicated page
108 ([[!debwiki Derivatives/Census/TAILS]]) on the Debian Wiki; in order
109 to better cooperate with Debian, we have followed their guidelines for
110 Debian Derivatives ([[!debwiki Derivatives/Guidelines]]); e.g. we have
111 published a statement about our
112 [[contribute/relationship_with_upstream]].
114 Website design: a few visible enhancements have been pushed online,
115 but stay tuned, some more is being worked on under the hood! Rumor
116 says our CSS gnomes are preparing something pretty slick.
118 # A glimpse towards the future
120 Bridges support: we now have a working prototype; it might not make
121 its way into the upcoming 0.7 release though.
123 Accessibility tools for visually impaired people have been
124 selected and are installed in our development Git branch.
126 We updated our survey of existing tools for easy install and upgrade
127 of Tails onto USB sticks, with support for an encrypted persistent
130 More and more upcoming Tails features (including [[todo/persistence]],
131 [[todo/macchanger]], [[todo/bridge support]]) need ways to ask the
132 user for input at boot time. We have [[researched various
133 ways|todo/boot_menu]] we could implement this.
135 We have researched how we could harden a bit Tails resistance against
136 exploitation of security issues in bundled software
137 ([[todo/Mandatory_Access_Control]], [[todo/nx_bit]], kernel hardening,
138 compiler hardening options) in a way that would not be a maintenance
139 burden... while being efficient enough to protect against some classes
140 of attacks. We have started efforts to push such hardening features in
143 A general plan was thought through to reorganize the Tails user
144 documentation. Once this is done, several entry points will be
145 available to better fit a given user's available time and energy. In
146 the meantime, we now at least have a [[nice
147 documentation|doc/first_steps/manual_usb_installation/linux]] that explains how
148 to install Tails onto a USB stick.