1 [[!meta
date=
"2012-10-29 12:34:56 +0200"]]
2 [[!meta
title=
"Call for testing: 0.14~rc2"]]
4 <p>You can help Tails! The
<em>second
</em> release candidate for the
5 upcoming version
0.14 is out. Please test it and see if all works for
10 <h1>How to test Tails
0.14~rc2?
</h1>
15 <strong>Keep in mind that this is a test image.
</strong> We have made sure
16 that it is not broken in an obvious way, but it might still contain
21 <p>Download the ISO image and its signature:
</p>
23 <a class=
"download-file"
24 href=
"http://dl.amnesia.boum.org/tails/testing/tails-i386-0.14~rc2/tails-i386-0.14~rc2.iso"
25 >Tails
0.14~rc2 ISO image
</a>
28 <a class=
"download-signature"
29 href=
"http://dl.amnesia.boum.org/tails/testing/tails-i386-0.14~rc2/tails-i386-0.14~rc2.iso.pgp"
30 >Tails
0.14~rc2 signature
</a>
35 [[Verify the ISO image|download#index3h1]].
40 Have a look at the list of
<a href=
"#known_issues">known issues
41 of this release
</a> and the list of [[longstanding known
42 issues|support/known_issues]].
52 <p>If you find anything that is not working as it should, please [[report to
53 us|doc/first_steps/bug_reporting]]! Bonus points if you check that it is not a
54 <a href=
"#known_issues">known issue of this release
</a> or a
55 [[longstanding known issue|support/known_issues]].
</p>
57 <h1>What's new since
0.14~rc1?
</h1>
59 Since the following changes are brand new in this release candidate
60 they are what we really need to be tested by you. In particular we ask
61 you to pay attention to whether Iceweasel has any new issues or not.
66 <li>Update to
10.0.9esr-
1+tails1, which has all the privacy enhancing
67 patches from the Tor Browser Bundle applied to it.
</li>
68 <li>Install iceweasel from our own repo, http://deb.tails.boum.org.
</li>
71 <li>Minor improvements
73 <li>Remove the last absolute path in our isolinux config, which makes
74 it easier to migrate from isolinux to syslinux (just rename the
75 directory), and hence might make it easier for
3rd party USB
76 installers (like the Universal USB Installer) to support Tails.
</li>
81 <li>Fix tordate vs. Tor
0.2.3.x. Since
0.2.3.x Tor doesn't download a
82 consensus for clocks that are more than
30 days in the past or
2
83 days in the future (see commits f4c1fa2 and
87622e4 in Tor's git
84 repo). For such clock skews we set the time to the Tor authority's
85 cert's valid-after date to ensure that a consensus can be
91 <li>Update tails-persistence-setup to
0.20-
1, which should make it
92 possible to install Tails on large (
>=
32 GiB) USB drives.
</li>
97 <h1>What's new since
0.13?
</h1>
100 <li>Major new features
102 <li>gpgApplet can now handle public-key cryptography.
</li>
103 <li>Install an additional, PAE-enabled kernel with NX-bit
104 support. This kernel is auto-selected when the hardware supports
107 <li>provide executable space protection, preventing certain types of
108 buffer overflows from being exploitable.
</li>
109 <li>enable more than
4 GiB of system memory.
</li>
110 <li>make all processors/cores available, including their
111 power-saving functionality.
</li>
114 <li>Add a persistence preset for NetworkManager connections.
</li>
115 <li>Enable Tor stream isolation; several new SocksPorts with
116 appropriate Isolate* options have been added for different use
117 cases (i.e. applications). All application's have been
118 reconfigured to use these new SocksPorts, which should increase
119 anonymity by making it more difficulte to correlate traffic from
120 different applications or
"online identities".
</li>
123 <li>Minor improvements
125 <li>On kexec reboot, make the boot quiet only if debug=wipemem was not
127 <li>Update torproject.org's APT repo key.
</li>
128 <li>Update the embedded Tails signing key.
</li>
129 <li>Use symlinks instead of dupliqcating localized searchplugins.
</li>
130 <li>Rewrite Tails firewall using ferm. Tails firewall was written in
131 very unsophisticated iptables-save/restore format. As more feature
132 creeped in, it started to be quite unreadable.
</li>
133 <li>Optimize VirtualBox modules build at runtime to avoid installing the
134 userspace utils N times.
</li>
135 <li>Drop most of Vidalia's configuration. Our custom lines just caused
136 trouble (with multiple SocksPorts) and the default works well.
</li>
137 <li>Blacklist PC speaker module. On some computers, having the
138 pcspkr module loaded means loud beeps at bootup, shutdown and when
139 using the console. As it draws useless attention to Tails users,
140 it is better to prevent Linux from loading it by default.
</li>
141 <li>Remove all addons from the Unsafe Browser. No addons are
142 essential for the Unsafe Browser's intent. If anything they will
143 modify the network fingerprint compared to a normal Iceweasel
144 install, which is undesirable.
</li>
145 <li>Prevent some unwanted packages to be installed at all, rather than
146 uninstalling them later. This should speed up the build a bit.
</li>
147 <li>Add a symlink from /etc/live/config to
148 /etc/live/config.d. This makes the system compatible with
149 live-config
3.0.4-
1, without breaking backward compatibility with
150 various parts of the system that use the old path.
</li>
151 <li>Do not run unecessary scripts during shutdown sequence, to make
152 shutdown faster.
</li>
153 <li>Fix Iceweasel's file associations. No more should you be suggested
154 to open a PDF in the GIMP.
</li>
155 <li>Make live-persist deal with persistent ~/.gconf subdirs so that
156 any options saved therein actually get persistent.
</li>
157 <li>Prevent memlockd unload on shutdown, to make sure that all
158 necessary tools for memory wiping are available when the new
159 kernel has kexec'd.
</li>
160 <li>Patch initscripts headers instead of fiddling with
161 update-rc.d. We now let insserv figure out the correct ordering
162 for the services during startup and shutdown, i.e. use
163 dependency-based boot sequencing.
</li>
168 <li>Include
<code>seq
</code> in the ramdisk environment: it is
169 used to wipe more memory. This fixes the long-standing bug about
170 Tails not cleaning all memory on shutdown.
</li>
171 <li>Fix Yelp crashing on internal links
</li>
172 <li>Allow amnesia user to use Tor's TransPort. This firewall
173 exception is necessary for applications that doesn't have
174 in-built SOCKS support and cannot use torsocks. One such example
175 is Claws Mail, which uses tsocks since torsocks makes it leak
176 the hostname. This exception, together with Tor's automatic
177 .onion mapping makes Claws Mail able to use hidden service mail
178 providers again.
</li>
179 <li>Force threads locking support in Python DBus binding. Without this
180 liveusb-creator doesn't work with a PAE-enabled kernel.
</li>
181 <li>Fix localized search plugins for 'es' and 'pt'
</li>
182 <li>Fix live-boot's readahead, which caused an unnecessary pause
184 <li>Factorize GCC wanted / available version numbers in
185 VirtualBox modules building hook. This, incidentally, fixes a
186 bug caused by duplication and not updating all instances.
</li>
191 <li>Update to version
0.2.3.22-rc-
1~~squeeze+
1, a new major
192 version. It's not a stable release, but we have been assured by
193 the Tor developers that this is the right move.
</li>
194 <li>Stop setting custom value for the Tor LongLivedPorts
195 setting. Gobby's port was upstreamed in Tor
0.2.3.x.
</li>
200 <li>Use curl instead of wget, and add a --proxy option passed through
202 <li>Remove the --fullrequest option, we don't need it anymore.
</li>
203 <li>Remove --dns-timeout option, we don't need it anymore.
</li>
204 <li>Change --proxy handling to support Debian Squeeze's curl.
</li>
205 <li>Clarify what happens if --proxy is not used.
</li>
206 <li>Compute the median of the diffs more correctly.
</li>
211 <li>Update Linux to
3.2.30-
1.
</li>
216 <li>Update vidalia to
0.2.20-
1+tails1.
</li>
217 <li>Update bundled WhisperBack package to
1.6.1:
219 <li>Raise the socket library timeout to
120 seconds
</li>
220 <li>Use smtplib's timeout parameter
</li>
221 <li>Fix error output when calling send a
2nd time
</li>
224 <li>Update liveusb-creator to
3.11.6-
3.
</li>
225 <li>Update i2p to
0.9.2.
</li>
226 <li>Update tails-persistence-setup to
0.18-
1.
</li>
227 <li>Install console-setup and keyboard-configuration from unstable
228 (required by new initramfs-tools).
</li>
229 <li>Update tails-greeter to
0.7.3:
231 <li>Import pt_BR translation.
</li>
232 <li>Let langpanel usable during option selection stage
</li>
233 <li>Print less debugging messages by default
234 (below are changes in tails-greeter
0.7.2:)
</li>
235 <li>Use correct test operators.
</li>
236 <li>Generate language codes of available locales at package build
238 <li>Read list of language codes from where we have saved it at
239 package build time.
</li>
240 <li>Drop tails-lang-helper, not used anymore.
</li>
241 <li>Do not compile locales at login time anymore. Tails now ships
247 <li>Internationalization
249 <li>Fix Tails specific Iceweasel localization for pt-BR
</li>
250 <li>Add Japanese input system: scim-anthy.
</li>
255 <li>Catch more errors during build time:
257 <li>Ensure that all local hooks start with 'set -e'.
</li>
258 <li>Fail hard if adduser fails in local hooks.
</li>
259 <li>Fail hard if 'rm' fails in local hooks.
</li>
262 <li>vagrant: Ensure we have the set of Perl packages needed by our
264 <li>vagrant: Configure live-build to ship with ftp.us.debian.org.
265 Using cdn.debian.net leads to bad interactions with Tor.
</li>
266 <li>vagrant: Don't use gzip compression when building from a tag, i.e.
268 <li>vagrant: Optionally use bootstrap stage cache for faster builds
269 via the 'cache' build option.
</li>
270 <li>vagrant: Make sure release builds are clean, i.e. they don't use
271 any potentially dangerous build options.
</li>
272 <li>vagrant: Disable live-build package caching. This build system is
273 meant to use an external caching proxy, so live-build's cache just
274 wastes RAM (for in-memory builds) or disk space.
</li>
275 <li>vagrant: use aufs magic instead of copying source into tmpfs.
276 This reduces the amount of RAM required for building Tails in.
</li>
277 <li>vagrant: Allow in-memory builds when a VM with enough memory is
278 already started.
</li>
283 <h1><a id=
"known_issues"></a>Known issues in
0.14~rc2
</h1>
285 <h2>Stream isolation inconsistency in Claws Mail
</h2>
287 <p>Claws Mail isn't using its dedicated Tor SocksPort for Tor hidden
288 service IMAP/POP/SMTP servers (instead Tor's TransPort is used). This
289 is just a deviation from Tails' design and should have no adverse real
290 world consequences.
</p>