Change history for Advanced Onion Router


2017-11-05 19:22:58
Updated by billon

  • Version: v0.3.1.45
  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. The program attempts to circumvent firewalls, website censorship, web trackinThe program attempts tools, and mocircumve. nt Alfirewalols, website ucenser of almorst hip, web tracking tools and more. Allows user of almost any applicationcation that connects t to the he Internet. Unlike similar clientnlike similar clients thatat requirequire a configurable proxy, AdvOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/ is able to "force" a program to use the [url=https://tor.eff.org/]Tor[/url] net network.Notote t that t the Tor or site re recommends [url=https://www.httorps://www.torproject.ot.org/download/dg/download/download-easy.httml.enn]against[/ugainst[/url] usising the e seervice ice for Tororrent coconnections.[b]Note:[/b]: Instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.
  • Download URL: http://www.te-home.net/?do=work&id=advor&file=1624&action=get
  • Keywords: advor advtor advancedonionrouter advanced%20onion%20router onioonrouter advancedonion
  • Release date: 2017-06-111-05
  • What's new: Updated:[list][*][font=monospace]geoip_c.h[/font] with [i]GeoIPCountryWhois.csv[/i] released on June 7'th; Octhere aobere 14'th; there are 163953678 IP ranges havining 32 ranges in the fake "A1" country; all 32 ranges ranges were approximated to real countries.[*]The OpenSSL library to 1.1.0g.[*]Directory authorities according to t[url]https://atlas.torproject.org/#se arch/flake "g:A1" counthory; 31 ranges were approximated to real coy[/untries.[*]The OpenSSL library to 1.1.0f].[/list]


2017-06-11 16:44:39
Updated by billon

  • What's new:


2017-06-11 16:43:47
Updated by billon

  • Website URL: https://sourceforgwww.te.-home.net/pret/?do=wojects/rk&id=advtor/
  • Version: v0.3.1.34
  • Download URL: https://sourceforgewww.net/projects/advte-hor/filmes/AdvOR-0.3.1.3/AdvOR-0.3.1.3.zipnet/do?do=wnlork&id=advor&file=162&action=get
  • Release date: 2017-056-141
  • What's new: [list][*Updated:[list][*][font=monospace]When a client uses an unrecognized Socks5 login, the request will be allowed; however, a warning will be shown that contains the username and the password to allow users to find bad configuration settings (this solves the problem with replacing Tor with AdvOR in the Tor Browser Bundle).[*]The files [i]Help\Firefox\readme.txt[/i] and [i]Help\Firefox\AdvOR.inieoip_c.h[/ifont] were updated to work with ith [i]Ge 6.5.2 version of ToIPCountr BrowseryWhois.csv[*/i]Upda released on June 7'th; there ared l153678 IP ranges having 32 rangges in the fake "A1" couantry; 31 ranges were approximated to real scountries.[*]The Opengs: 3262,SSL library 3263to 1.1.0f.[/list]


2017-05-15 06:57:47
Updated by billon

  • Version: v0.3.1.23
  • Download URL: https://sourceforge.net/projects/advtor/files/latestAdvOR-0.3.1.3/AdvOR-0.3.1.3.zip/download
  • Release date: 2017-05-0514
  • What's new: [list][*]Corrected some plugin calls that were using different calling conventions than expected when compiled with newest versions of gcc.[*]Added a splitter between the main tree and the configuration page that can be used to resize the configuratioWhen p age.[*]If both [font=monospace]WindowPos[/font] and [font=monospace]GucliPlacement3[/font] auses an unrecognized fSoucks5 logind, [font=monospace]GuiPlacement3[/font] is used because it stores splitter's position ([font=monospace]WindowPos[/font] will still the request will be saved to [i]AdvOR.ini[/i]).[*]Messages that are allogged before the GUI is created are cached and shown later in the Debug window.[*][font=monospace]geoip_c.d; h[/fowever, a warnt] was updating will bed showith [i]GeoIPCounn thatryWhois. csv[/i] released on May 2nd; there are 153441 IP rangntains the usernames having 32 rangnd the password to inallow the fake "A1"users to find bad country; 31 figuration settinges were approxi (this solves the problem with replatedcing Tor wito h AdvOR in the Tor Browsere Bundle).[*]The files [i]Help\Firefox\readme.txt[/i] and [i]Hel coup\Firefox\AdvOR.inti[/i] were updated to work with the 6.5.2 version of Tor Browser.[*]Updated language strings: 3262, 3263.[/list]


2017-05-06 04:10:31
Updated by billon

  • Version: v0.3.1.12
  • Release date: 2017-045-2705
  • What's new: [list][*]AdCorrected some plugin calls that were using different calling conventions than expected when compiled with newest versions of gcc.[*]Added a splitter between the main tree and the configuration page that can be used to resize the configuration page.[*]If both [font=monospace]WindowPos[/font] and [font=monospace]GuiPlacement3[/font] are found, [font=monospace]GuiPlacement3[/font] is used because it stores splitter's position ([font=monospace]WindowPos[/font] will still be saved support for Uto [i]AdvOR.inico[/i]).[*]Messages that are logged before the cGUI is created are cached and shown later in the Debug window.[*][font=mmaonospace]geoip_c.h[/font] was updated l wine argth [i]GeoIPCouments; [font=monryWhospais.ce]main()[sv[/font] will use [font=monospace]argv[][/fonti] releargumsed onts coMay 2nvd; there are 153441 IP rtangeds having 32 from Unicode to UTF-8.[*]Corrected some memory allocation problems that could anges in thad caused deallocation of iake "A1" counvalid memorytry; 31 rangegions.[*]The procwedure that searches the memory allocated for [i]pproxul.dll[/i] for a function thmat can be called to delete cookies from Firefed tox when changing the idrentity was removed.[*]Starting with this version, al counfiguration options used by both 0.3x and 0.4x vetriesions of AdvOR will be saved to [i]AdvOR.ini[/i].[/list]


2017-04-28 09:47:19
Updated by billon

  • Version: v0.3.1.01
  • Release date: 2017-04-1127
  • What's new: [list][*]DirServers was renamed to DirAuthorities, to update the list of directory authorities in older AdvOR.ini files.[*]as2asm can now handle files larger than 73Added support for Unicode command line arguments; [font=monospace]main()[/font] will use MB.[*font=monospace]argv[][/font]Upd atrgumed:[lisnt][*]Lbras converted from Unicodes: libevent-2.1.8-s table, openssl UTF-1.1.0e, zlib-1.2.1;[*]The AS path tree with latest AS path definitions from cidr-report.org; there are 281211 AS 8.[*]Corrected some memory allocation problems that could had caused deallocation of invalid memory regions.[*]The patrocedure that searches the memory allocated for [i]xul.dll[/i] for a function that can be called to delete cookies from Firefox when changing the identity was dremovefinitions;d.[*]csv2Stasm rting with lat this verstion, AS path definitions;[*]geoip_c.h with GeoIPCounconfiguratryWhois.csv released on A oprtilons 6th; there are 151790 IP ranges having 33 ranges in the fake "A1"used by cbountry; h 0.32x rangd 0.4x versions of AdvOR were approximated to real countries;[*]Langul be sagve strd to [i]AdvOR.ings: 491, 531, 657.i[/list].[/list]


2017-04-11 19:53:39
Updated by billon

  • What's new: [list][*]DirServers was renamed to DirAuthorities, to update the list of directory authorities in older AdvOR.ini files.[*]as2asm can now handle files larger than 73 MB.[*]Updated:[list][*]Lbraries: libevent-2.1.8-stable, openssl-1.1.0e, zlib-1.2.1;[*]The AS path tree with latest AS path definitions from cidr-report.org; there are 281211 AS path definitions;[*]csv2asm with latest AS path definitions;[*]geoip_c.h with GeoIPCountryWhois.csv released on April 6th; there are 151790 IP ranges having 33 ranges in the fake "A1" country; 32 ranges were approximated to real countries;[*]Language strings: 491, 531, 657.[/linkst][/list]


2017-04-11 19:51:59
Updated by billon

  • Website URL: https://www.tsourceforge-home..net/?do=wet/prork&id=jects/advtor/
  • Version: v0.3.01.270
  • License: [url=https://sourceforge.net/projects/advtor/develop]Various Open Source[/url]
  • Download URL: https://www.te-homesourceforge.net/?projects/advtor/files/latest/do=wnlork&id=advor
  • Release date: 2017-024-121
  • What's new: Updated:[list][list][*]The ODirServers was renamed to DirAuthorities, to update the list of directory authorities inSSL olibderary AdvOR.ini files.[*]as2asm can now handle files larger than 73 MB.[*]Updated:[list][*]Lbraries: libevent-2.1.8-stoable, openssl-1.1.0.2k.[*]The, zLib library to -1.2.11;[*]The AS path tree with latest AS path definitions from cidr-report.org; there are 281211 AS path definitions;[*]csv2asm with latest AS path definitions;[*][i]geoip_c.h[/i] with [i]c.h with GeeoIPCountrryWhois.csv[/i] releasehois.csv released on February 7'th April 6th; therthere are 151790033 IP range ranges having 32 33 ranges in the e fake "e "A1" country; all 32 ranges were ap; 32 ranges were approximatated to rea to real countriees;[*]anguage strings: 491, 531, 657.[/link][/list]


2017-02-12 20:50:51
Updated by billon

  • Size (in bytes): 106981266574
  • Icon: Updated


2017-02-12 20:39:50
Updated by billon

  • What's new: Updated:[list][*]The OpenSSL library to 1.0.2k.[*]The zLib library to 1.2.11.[*][i]geoip_c.h[/i] was updated with [i]GeoIPCountryWhois.csv[/i] released on February 7'th; there are 150033 IP ranges having 32 ranges in the fake "A1" country; all 32 ranges were approximated to real countries.[/list]


2017-02-12 20:39:12
Updated by billon

  • Version: v0.3.0.267
  • Release date: 20167-02-11-062
  • What's new: [lisUpdat][*][i]geoip_c.h[/i] was updated with ed:[list][i*]GeoIPCountryWThois.csv[/e OpenSSL li] breleased onry October 31'st; there are 146784 IP ranges having 31 ranges in the fake "A1" country; all 3 1 ranges were approximated to real countries.0.2k.[*]Updated dirThectory authoritzLib lies braccordingy to 1.2.11.[*][i]geoip_c.h[url/i]htt was ups://adated with [i]GeoIPCountlas.torpryWhojectis.org/#csev[/i] released on February 7'th; there arce 150033 IP ranges having 32 ranges in th/e fake "A1" country; all 32 rang:Aes were approximated to real counthority[/url]es.[/list]


2016-11-06 18:08:26
Updated by billon

  • Similar/alternative apps: [url=https://www.portablefreeware.com/index.php?id=1088]PortableTor[/url]


2016-11-06 18:07:10
Updated by billon

  • Version: v0.3.0.256
  • Release date: 2016-10-14-06
  • What's new: [list][*]The OpenSSL library was updated to openssl-1.0.2j.[*i]geoip_c.h was c.h[/i] was updated with GeoIPCountryWhoisith [i]GeoIPCountryWhois.csv[/i] released o on October 431'thst; there ere are 145467084 IP ranges having 31 ranges in the fake "A1" co country; all 31 ranges were approximated to real countries.[*]Updated directory authorities according to [untry; all 31 rrl]https://atlans.torproject.orge/#s weare ch/flapproximated to real cog:Aunthoriesty[/url].[/list]


2016-10-14 14:04:25
Updated by billon

  • What's new: [list][*]The OpenSSL library was updated to openssl-1.0.2j.[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October 4'th; there are 145708 IP ranges having 31 ranges in the fake "A1" country; all 31 ranges were approximated to real countries[/list]


2016-10-14 14:03:35
Updated by billon

  • Version: v0.3.0.245
  • Release date: 2016-106-124
  • What's new: [list][*]he OpenSSL library was updated to openssl-1.0.2j.[*]geoip_c.h wa was updated withith GeoIPCoountryWhois.cscsv r releeaseed on Junon October 74'th; th; there are are 1233 14570 8 IP ranges having 94 ranges inhaving 31 ranges in the fake "A1" country; 9all 31 ranges were approximated to real countries.[/list]


2016-06-12 23:17:21
Updated by billon

  • Version: v0.3.0.234
  • Size (in bytes): 106568431657
  • Release date: 2016-056-142
  • What's new: [list][*]The OpenSSL library was updated to openssl-1.0.2h.[*]geoip_c.h wc.h was updated dated with GeoIPCountryWhoiss.csv released on May 3 June 7'rdth; there ere are 1123317330 IP ranges having 94 ranges in the fake "A1" country; 91 ranges were approximated to real countries.[/list]


2016-05-14 15:57:53
Updated by billon

  • Size (in bytes): 10635658543


2016-05-14 15:55:33
Updated by billon

  • Version: v0.3.0.223
  • Download URL: http://www.te-home.net/?do=work&id=advor&file=108
  • Release date: 2016-045-124
  • What's new: [list][*]The OpenSSL library was updated to openssl-1.0.2h.[*]geoip_c.h wc.h was updateddated with GeoIPCountryWhohoiss.csv rele released on April 5n May 3'thrd; there ere are 120651733 IP ranges having 94 ranges in the fake "A1" country; 91 ranges were approximated to real countries.[/list]


2016-04-12 17:33:08
Updated by billon

  • Version: v0.3.0.212
  • Size (in bytes): 106122365825
  • Download URL: http://www.te-home.net/?do=work&id=advor&file=9108
  • Release date: 2016-034-102
  • What's new: [list][*]The OpenSSL library was updated to openssl-1.0.2g.[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on March 2ndois.csv released on April 5'th; there ere are 1192072651 IP ranges having 92 ranges iP ranges having 94 ranges in the e fake "A1" countr country; 8 9 1 ranges weere approproximated to real cated tountries.[*]Updated direal ctory aunthorities.[/list]


2016-03-19 22:00:54
Updated by billon

  • Website URL: http://sourceforgwww.te.-home.net/pret/?do=wojects/rk&id=advtor/
  • Version: v0.3.0.201
  • System Requirement:
  • Size (in bytes): 1009785612282
  • Download URL: http://swww.te-hourceforge.net/prme.net/?do=wojects/rk&id=advtor/&files/=98
  • Release date: 20000-0016-03-10
  • What's new: 2014-04-17 Advanced Onion Router 0.3.0.20[list][*]corrected: the subdomain was not removed from an .onion address when searching for its rendezvous descriptor (thanks to AyrA for reporting this problem on sf.net)[*]the OpenSSL library was updated to openssl-1.0.1g[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on April 2nd; there are 93477 IP ranges having 102 ranges in the fake "A1" country; 98 ranges were approximated to real countries[/list]2013-12-10 Advanced Onion Router 0.3.0.19a[list][*]corrected: possible buffer overflow when setting a huge OS version string[*]corrected: when changing the default OS version, a buffer that was not allocated with tor_malloc() was freed with tor_free() (thanks to anonymous for reporting this problem on sf.net)[*]corrected: a generated AS path included some extra nodes that were before the selected path in the AS tree from geoip_as.h[*[list]the program that imports AS path definitions and generates the geoip_as.h file is now included in the source code archive (as2asm)[*]thThe Ope AnSS path tree was updated withL library watest AS updated to opath definitions from cidrsl-report1.0.2g.org; a few errors were corrected in the AS tree import algorithm[*]geoip_c.h wah was updateted wiith GeoIPCountryWhoishois.csv released on December 5th; there are 84715 csv released on March 2nd; there are 119072 IP raanges having 114 raing 92 ranges inges in tthe fake " "A1" country; 110 range 89 ranges were apere approximateated too real countriuntries.[*]uUpdated languagte sd directory authoringties: 1248.[/list]


2014-11-30 03:05:27
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. The program attempts to circumvent firewalls, website censorship, web tracking tools, and more. Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network.Note that the Tor site recommends [url=https://www.torproject.org/download/download-easy.html.en]against[/url] using the service for Torrent connections.[b]Note:[/b] Instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2014-06-11 12:25:44
Updated by Midas

  • Forum topic ID: 6891602


2014-04-20 06:01:37
Updated by SYSTEM

  • Version: v0.3.0.1920
  • Size (in bytes): 100937840581
  • What's new: [list][*]corrected: possible buffer overflow when deleting Flash player's history from a truncated .sol file (thanks to anonymous for reporting this problem on sf.net)[*]corrected: when updating address maps using the "Associate addresses" dialog, the displayed exit node was changed to "new exit"[*]corrected: the number of downloaded bytes was not shown by the Blacklist plugin unless a language file was loaded[*]corrected: when an application sent a Socks5 connection request followed by an HTTP request without waiting for connection status for the Socks5 request, the Socks5 connection status was prepended to the HTTP reply; this error prevented some programs from using Socks5 with AdvOR, like the Tor Browser Bundle from torproject.org (thanks to anonymous for reporting this error on sf.net)[*]corrected: the circuit build dialog could had been used to build a circuit with no nodes (thanks to anonymous for reporting this problem on sf.net)[*]updates from the "Associate addresses" dialog are scheduled instead of updating address maps while the user changes them (thanks to anonymous for reporting this problem on sf.net)[*]the function escaped() was replaced by esc_for_log() to solve some possible non2014-reentrancy problems and memory leaks caused by it[*]added instructions for using the Dooble browser with AdvOR, a sample configuration file and a patch that prevents it from downloadi04-17 Advang scripts from Google to AdvOR\Help\Dooble (reaedme.txt, AdvOR.ini and patch-dooble.*).Onion Router 0.3.0.20[list][*]the Blacklist plugin now has an URL for the "Primary thcorreats" blacklist from iblocklist.com (it can be seleccted from: thhe URL hsubdomain wast noryt corembo box)[*]updved from an .onion ated libradress when searchies:ng for libeits rendezvent-2.0.21-sous descriptor (thable, openkssl-1.0.1e, zlib-1.2.8, to AyrA for reporting this problem on sf.net)[*]the OpenSSL libnrary was updated to opensslm-11.0.41g[*]geoip_c.h was updated witc.h was updated with GeooIPCountntryWhois.cssv rel released on April 2nd; there asred on November 5th; there are 86068 93477 IP ranges having 102 ran ranges having 102 ranges in the e faake e "A1" country; 98 ranges were approximated to real countries[/list]2013-12-10 A1"dvanced Onion Router 0.3.0.19a[list][*]correcountry;ed: possible 102 rangbuffer overflow when setting a huge OS version string[*]corrected: when changing the default OS version, a buffer that was not allocated with tor_malloc() was freed weith tor_free() (thanks to anonymous for reporting this problem on sf.net)[*]corrected: a generated AS path included some extra nodes that were before the selected path in the AS tre appre from geoip_as.h[*]the program that imports AS path definitions and generates the geoip_as.h file is now included in the source coxde archive (as2asma)[*]the AS path tree was updated with latest AS path definitions from cidr-report.org; a few errors were corrected in the AS tree import algoritehm[*]geoip_c.h was updated with GeoIPCountryWhois.csv realeleased on December 5th; there are 84715 IP ranges having 114 ranges in the fake "A1" country; 110 ranges were approximated to real counntries[*]updated language striengs: 1248[/list]


2014-03-15 00:14:25
Updated by Checker

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. The program attempts to circumvent firewalls, website censorship, web tracking tools, and more. Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network.[b]Note:[/b] iInstructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2013-12-08 07:06:57
Updated by SYSTEM

  • Version: v0.3.0.18b9
  • Size (in bytes): 19384016170658
  • What's new: 2013-04-23 Advanced Onion Router 0.3.0.18b[list][*]corrected: the variable IdentityAutoChange was initialized with a wrong value (thanks to anonymous for reporting this error on sf.net)[/list]2013-04-22 Advanced Onion Router 0.3.0.18a[list][*]corrected: a duplicate variable name "iplist" (a pointer in dlg_bypassbl.c and an array in routerlist.c) caused a pointer to be overwritten with the first IP address that was shown in the "Select IP" system tray menu (thanks to anonymous for reporting this error on sf.net)[/list]2013-04-20 Advanced Onion Router 0.3.0.18[list][*]corrected: when updating some settings from the "Private identity" page with new language strings, a program restart was needed[*]new option on the "Bypass Tor blacklists" page: "Save node statistics to exclude nodes that were restarted and have the same IP"; the list of IPs of exit nodes can be saved to a file to better estimate their longevity at a later time, for detecting new nodes with a better accuracy (ExitSeenFlags)[*]new option on the "Bypass Tor blacklists" page: "Assume blacklists remove IPs that were not seen for [time_interval]"; IPs of nodes that were no longer seen for a long period of time can be automatically removed from AdvOR-iplist.dat to allow re-using IPs with websites that use blacklists that remove old entries (ExitMaxSeen)[*]the "Hidden services" configuration page now has checkboxes near all configured hidden services to allow enabling/disabling them during AdvOR runtime (requested by anonymous on sf.net); all checkboxes are enabled by default and their state is not saved to AdvOR.ini[*]updated language strings: 3260, 3261[/list]2013-04-05 Advanced Onion Router 0.3.0.17[list][*]corrected: possible buffer overflow in GetConnInfo() (thanks to anonymous for reporting this error on sf.net)[*]the procedure initmemunits() was moved [list][*]corrected: possible buffrom dlg_connections.c to dlg_util.c[*]new configuration option: IdentityAutoChange[*]new option on the "Private identity" page: "Show a completion MessageBox"; this option can be used to disable the message box shown when the identity is changed (IdentityFlags)[*]new option on the "Private identity" page: "Every [time_interval] change my IP|identity"; this option can be used to automatically change the exit IP over the identity at a specified time intervalow when (Ideletintityg Flags, IdentityAutoChange); when this option is enabled, next IP is selected according to the configured exit selection algorithm (details in the help file)[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on April 2nd; there are 169256 IP ranges having 455 ranges in the fake "A1" country; 451 ranges were approximated to real countries[*]updated language strings: 3247, 3248, 3249, 3250, 3251, 3252, 3253, 3254, 3255, 3256, 3257, 3258, 3259[/list]2013-03-20 Advanced Onion Router 0.3.0.16c[list][*]corrected: if server mode was disabled while AdvOR was in hibernation mode, when reconnecting to the OR network the server identity key remained set while server mode was disabsh pled, triggering an assert in get_server_identity_key() (thanks to anonymouer's history for reportingm a this probruncated .solem on sf.nile (t)[/list]2013-03-19 Advhancednks Oniton Roanonymouts for reporting this 0.3.0.16prob[liem on st]f.net)[*]ccorreected: when updating address maps using the "Associatee add:resses" when changing server mdialode settings, dns_launch_correctness_checks() could had been calle the d before configuring the namesplayed servers (thanks xito annonymousde fwas changed tor r"new eportxingt"[*]corrected: this proe numblemr of down sf.net)[/list]2013-03-18 Aoadvanced Obytes was not shown by the Blacklist plugion Ron utnler 0.3.0.16ss a[l language file wast] loaded[*]corrected: when an application sent a Socks5 connection request followed by an HTTP request without waiting for connection status for the Socks5 request, the Socks5 connection status was prepended to the "Hidden ServiceTTP reply; this error prevented s"ome paroge wras initialized wms from usith theng resSource idenks5 with AdvOR, lifiker of another page (thanks to anonymous for repTorting this p Broblem on sf.net)[*]the AdvOR.ini wser Bundle from torproject.org (thanks to anonymous for reporting this error on sf.net)[*]corrected: the circuit build dialog could had been used to build a circuit with no nodes (thanks to anonymous for reporting this proble fem or Firefox wasn sf.net)[*]updates from the "Associate addresses" dialog are scheduled instead of updating address maps while the user changes them (thanks to anonymous for reporting this problem on sf.net)[*]the fupnction escaped() was replatced to wby esc_fork with the _laog() to solve some possible non-reentrancy problems and memory leaks caused by it[*]added instructions for using the Dooble browser with AdvOR, a sample configuration file and a patch that prevents it from downloading scriptes from Google t "Tor Browser" packAdvOR\Help\Dooble (readme.txt, AdvOR.ini and patch-dooble.*).[*]the Blacklist pluge fin now has an URL for the "Primary threats" blacklist froom iblocklist.com (it can be selected from the URL history com torprbo box)[*]updated libraries: libevent-2.0.21-stable, openssl-1.0.1e, zlib-1.2.8, libntlm-1.4[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on November 5th; there are 86068 IP ranges having 102 ranges in the fake "A1" country; 102 ranges were approximated toj real ct.ountrgies[/list]


2013-05-05 11:57:14
Updated by SYSTEM

  • Version: v0.3.0.168b
  • Size (in bytes): 101979461706
  • What's new: [list][*]corrected: the list with directory authorities was initialized with values from a read-on2013-04-23 Advanced Onion Router 0.3.0.18b[list][*]corrected: the variable IdentityAutoChange was initialized with a wrong value (thanks to anonymous for reporting this error on sf.net)[/list]2013-04-22 Advanced Onion Router 0.3.0.18a[list][*]corrected: a duplicate variable name "iplist" (a pointer in dlg_bypassbl.c and an array in routerlist.c) caused a pointer to be overwritten with the first IP address that was shown in the "Select IP" system tray menu (thanks to anonymous for reporting this error on sf.net)[/list]2013-04-20 Advanced Onion Router 0.3.0.18[list][*]corrected: when updating some settings from the "Private identity" page with new language strings, a program restart was needed[*]new option on the "Bypass Tor blacklists" page: "Save node statistics to exclude nodes that were restarted and have the same IP"; the list of IPs of exit nodes can be saved to a file to better estimate their longevity at a later time, for detecting new nodes with a better accuracy (ExitSeenFlags)[*]new option on the "Bypass Tor blacklists" page: "Assume blacklists remove IPs that were not seen for [time_interval]"; IPs of nodes that were no longer seen for a long period of time can be automatically removed from AdvOR-iplist.dat to allow re-using IPs with websites that use blacklists that remove old entries (ExitMaxSeen)[*]the "Hidden services" configuration page now has checkboxes near all configured hidden services to allow enabling/disabling them during AdvOR runtime (requested by anonymous on sf.net); all checkboxes are enabled by default and their state is not saved to AdvOR.ini[*]updated language strings: 3260, 3261[/list]2013-04-05 Advanced Onion Router 0.3.0.17[list][*]corrected: possible buffer overflow in GetConnInfo() (thanks to anonymous for reporting this error on sf.net)[*]the procedure initmemunits() was moved from dlg_connections.c to dlg_util.c[*]new configuration option: IdentityAutoChange[*]new option on the "Private identity" page: "Show a completion MessageBox"; this option can be used to disable the message box shown when the identity is changed (IdentityFlags)[*]new option on the "Private identity" page: "Every [time_interval] change my IP|identity"; this option can be used to automatically change the exit IP or the identity at a specified time interval (IdentityFlags, IdentityAutoChange); when this option is enabled, next IP is selected according to the configured exit selection algorithm (details in the help file)[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on April 2nd; there are 169256 IP ranges having 455 ranges in the fake "A1" country; 451 ranges were approximated to real countries[*]updated language strings: 3247, 3248, 3249, 3250, 3251, 3252, 3253, 3254, 3255, 3256, 3257, 3258, 3259[/list]2013-03-20 Advanced Onion Router 0.3.0.16c[list][*]corrected: if server mode was disabled while AdvOR was in hibernation mode, when reconnecting to the OR network the server identity key remained set while server mode was disabled, triggering an assert in get_server_identity_key() (thanks to anonymous for reporting this problem on sf.net)[/list]2013-03-19 Advanced Onion Router 0.3.0.16b[list][*]corrected: when changing server mode settings, dns_launch_correctness_checks() could had been called before configuring the name servers (thanks to anonymous for reporting this problem on sf.net)[/locaist]2013-03-18 Advanced Onion (Routhanks toer 0.3.0.16anonymous for report[ling this error on sf.net)][*]ccorrerecteded: address map association updates required a program restart (thanks to anonymous the "Hidden Services" page was initialized with the resource identifier of another page (thanks to anonymous forr reporting this proorting this probleem o on sf.netnet)[*]corrected: when re-connecting to ththe AdvOR network, l.isteners werei sometiames deplayed, causfor Fing ports to stay closed for up to 60 seconds[*]corrected: the procedures that disconnect AdvOR from the OR network arerefox now scheduled (thankas to anonymo us for reporting this problem on sf.net)[*]the procedures related to the "Associated addresses" page were moved to a separate file, dlg_addrmaps.c[*]added the option to use browser's original User-Agent string; thdated option is available on work withe the latest "HTTP headers" page as "Don't anonymize browser type" (requested by anonymous on sf.net)[*]new option on the exit selection dialog: "Use only recent exits that are por Brobably not blackliwsted yetr" (requested by anonymous on sf.net); this option sets a filter for recent nodes that are not in blacklists that were not updated recently[*]new page: "Bypass Tor blapacklists" with options related to bypassing bans on websites that use blacklists to ban Tor and other proxies (dlg_bypassbl.c)[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on March 3rd; there are 179875 IP from torpranges having 375 ranges in the fake "A1" country; 372 ranges were approximated to real countries[*]updated languagje sct.orings: 3235, 3236, 3237, 3238, 3239, 3240, 3241, 3242, 3243, 3244, 3245, 3246[/list]


2013-03-16 19:08:21
Updated by SYSTEM

  • Version: v0.3.0.156
  • Size (in bytes): 1019795419585
  • What's new: [list][*]corrected: if no hibernation interval is set, hibernation state is no longer changed (thanks to anonymous for reporting this error on sf.net)[*]corrected: init_keys() could had been called twice, when the OR port number was changed (thanks to anonymous for reporting this error on sf.net)[*]corrected: fast hibernation state changes could had caused the main thread to be created twice (thanks to anonymous for reporting this error on sf.net)[*]corrected a memory leak in parse_request_headers()[*]corrected an infinite loop that could had been caused by using "--select-exit" without specifying an exit node[*]when updating the OR network, a failure to update the circuit tree due to insufficient system resources will cause a warning message to be shown, recommending a system restart (thanks to anonymous for reporting this problem on sf.net; language string: 3234)[*]the host banlist is now also checked when parsing HTTP headers to prevent a banned host from being used in an HTTP request sent to a server that is not banned[*]the welcomthe list with directory authorities was initialized with values from a read-only location (thanks to anonymous for reporting this error on sf.net)[*]corrected: address map association updates required a program restart (thanks to anonymous for reporting this problem message now displays 2 available download locations for AdvOR, SourceForge aond SosftPedia (la.nguage string: 1248)[*]necorrected: w command line paramethen rer: "--exec" that can be used tco execute and interecept at startup aing program that was not added tto the "Quick StaOR networt"k, list; ifisteners were ansothmer tinmest delanyed, ceausing ports tof AdvORstay closed for up to 60 seconds[*]corrected: the procedures that disconnect AdvOR from the OR network are now scheduled (thanks to anonymous for reporting this al probleadym on sf.netarted from )[*]the same location, thise parameter is passed tro that instance (langduage string: 46)[*]es related the license for the C"Asv2Asm program was chsociated anged from *unspecified* to Creative Commonsses" NonCommercipal[*]ge were moved toi a sep_c.h wasrate upfile, dlg_addrmated with GeoIPCountryWhoips.csv rele[*]asedded the option Dec to usem ber 4th; there owser's original User-Agent string; the option is 105985 Iavailable on the "HTTP r headers" page as "Don't anonymize browser type" (requested by anonymous on sf.net)[*]new option on the exit selection dianlog: "Use only recent exits thaving 369at are probably not blangecklisted in yethe fake "A1" count(ry; 367 ranges were approximatqued tosted by anonymous on sf.net); this option sets a filter for recent nodes that are not in blacklists that were not updated recently[*]new page: "Bypass Tor blacklists" with options reaelated ctountries bypassing bans on websites that use blacklists to ban Tor and other proxies (dlg_bypassbl.c)[*]ugeoip_c.h was updaated with GeoIPCountryWhois.csv released on March 3rd; there are 179875 IP rangeds lanhaving 375 ranges in the fake "A1" country; 372 ranges were approximated to real countries[*]updated language strings: 46, 124 3235, 3236, 3237, 3238, 32339, 3240, 3241, 3242, 3243, 3244, 3245, 3246[/list]


2013-03-16 17:25:23
Updated by webfork

  • Screenshot: Updated
  • Keywords: advor advtor onionrouter advancedonion


2012-12-23 15:26:25
Updated by SYSTEM

  • Version: v0.3.0.145
  • Size (in bytes): 9505193585
  • Similar/alternative apps: [url=http://www.portablefreeware.com/index.php?id=1088]PortableTor[/url]
  • What's new: [list][*]corrected: when chanif no hibernation interval is set, hibernation state is no longer changed (thanks to anonymous for reporting this error on sf.net)[*]corrected: init_keys() could had been called twice, when the OR port number was changed (thanks to anonymous for reporting this error on sf.net)[*]corrected: fast hibernation state changes could had caused the main thread to be created twice (thanks to anonymous for reporting this error on sf.net)[*]corrected a memory leak in parse_request_headers()[*]corrected an infinite loop that could had been caused by using "--select-exit" without specifying an exit node[*]when updating the OR network, a failure to update the circuit tree due to insufficient system resources will cause a warning message to be shown, recommending a system restart (thanks to anonymous for reporting this problem on sf.net; language string: 3234)[*]the host banlist is now also checked when parsing HTTP headers to prevent a banned host from being used in an HTTP request sent to a server that is not banned[*]the welcome message now displays 2 available download locations for AdvOR, SourceForge and SoftPedia (language string: 1248)[*]new command line parameter: "--exec" that can be used to execute and ing servtercept at startup a program that dewas not added to the "Quick Start" list; if another ipnstor typances, of AdvOR couis alread try to free a bufstarted from the same location, this parameter th is patssed to that winstasnce a(lready frenguaged (thank s to anonymous for reporting this error ong: sf.net46)[*]the csv2asm [*]the license for the Csv2Asm program was changed from *unspecified* to Creative Commons NonCommercial[*]geoip_c.h was updated with GeoIPCountryWhois.csv rogreleam nsed own approxiDecematbes Gr 4th; there areoIP's "A1"05985 fake country to a neighboring IPIP ranges having 369 range's couintry that has the same AS path as the blfacklisted IP range[*]thee "A1" country that has IP ranges blacklisted by MaxMind is shown using th; 367 ranges were appproximated country followed by an asterisk in node selection dialogs and in the "OR netwo rk" diealog[*]country bans and the restriction to build circuits with IPs from different countries are verified using the approximated country instead of GeoIP's fake "A1" counttry (this solves a security problem where a circuit like US-DE-A1 where A1=US could had been built)es[*]router selection dialogs no longer disuplay "Anonymous Proxy" as a vdalid country[*]new option on the "Banned routers" page: "Do not use exits that were blacklisted by MaxMind's GeoIP" that can be enabled when country restrictions enforced by some websites can't be bypassed because the website is using a GeoIP having blacklisted IP ranges[*]geoip_c.h was updated with GeoIPCountryWhois.csv red leased on November 7th; there are 105478 IP ranges having 368 ranges in the fake "A1" country; 366 ranges were approximated to real countries[*]updated languguage strings: 3232 46, 31248, 32334[/list]


2012-11-18 13:29:28
Updated by SYSTEM

  • Version: v0.3.0.134
  • System Requirement:
  • Size (in bytes): 945059829835
  • What's new: [list][*]corrected: when remapping an addrechanging server des, crif aptor typlugin es, AdvOR could try to free a buffer that was already freed (thanks to anonymous for reporting this error on sf.net)[*]the csv2asm program now approximates GeoIP's "A1" fake country to a neighboring IP range's country that has the same AS path as the blacklisted IP range[*]the "A1" country that has IP ranges blacklisted by MaxMind is shown using the approximated country followed by an asterisk in node selection dialogs and in the "OR network" dialog[*]country bans and the restriction to build circuits with IPs from different countries are verified using the approxpoimated country instead of GeoIP's fake "A1" country (this solves a security problem where a circuit like US-DE-A1 where A1=US could had been built)[*]router selection dialogs no longer display "AdvTor_Tnonymous Proxy" as a valid country[*]new option on the "Banned routers" page: "Do not use exits that were blacklisted by MaxMind's GeoIP" that can be enabled when country restrictions enforced by some websites cansla't beAddres bypas(),sed because the website is using a GeoIP having blacklisthe new_address pa IP rt of aan addresgesma[*]geoip_entry_t structure wasc.h freed without undating it with the new remapas uped address; this error caused random crashes ted when a plith GeoIPCougntryWhois.csv released on that expNovember 7th; thedre are 105478 IP ranges AdhavTor_TranslateAddress() (like the Blacklist plugin) was loaded (thanks to anonymous for reporting this erro368 ranges on sf.inet)[*] thee fake "A1" vcountry; 366 ralunges were fappror the source code file name pointer is written to AdvOR-crash.txt instead of the file name pointed by it[*]AdvOR.dlximated to real icounctreasies the reference count for WS2_32.dll to prevent an intercepted application from unloading it[*]if more pl[*]ugins export TransldateAddress and have the right to translate addresses, the address that was remapped by plugins is rewritten only od lance, after all plugins events handlers are callguaged[*]AdvOR no longer formats useless controller messages if no con stroller is connected[*]updatedgs: libraries: libevent-2.0.32320-stable, openssl-1.0.1c[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October 30th233[/list]


2012-11-04 09:52:13
Updated by SYSTEM

  • Version: v0.3.0.12b3
  • Size (in bytes): 1007694982698
  • What's new: 2012-10-19 Advanced Onion Router 0.3.0.12b[list][*]corrected: buffer overflow in dir_split_resource_into_fingerprints() (thanks to anonymous for reporting this error on sf.net)[*]corrected: when the entry "No exit" was selected, AdvOR tried to use a country from GeoIP when changing the identity[*]added extra memory checks in addressmap_ent_free() and in aes_free_cipher() to get better error reports for 2 bugs reported on sf.net forums[/list]2012-10-17 Advanced Onion Router 0.3.0.12a[list][*]corrected: the function start_of_month() was not updated to use tor_timegm() with its new syntax (thanks to anonymous for reporting this error on sf.net)[*]corrected: the original address of a socks request was not always set for requests made by intercepted programs that were also configured to use AdvOR as a proxy[/list]2012-10-16 Advanced Onion Router 0.3.0.12[list][*][tor-0.2.2.39] Fix an assertion failure in tor_timegm() that could be triggered by a badly formatted directory object. Bug found by fuzzing with Radamsa. Fixes bug 6811; bugfix on 0.2.0.20-rc.[*][tor-0.2.2.39] Do not crash when comparing an address with port value 0 to an address policy. This bug could have been used to cause a remote assertion failure by or against directory authorities, or to allow some applications to crash clients. Fixes bug 6690; bugfix on 0.2.1.10-alpha.[*]corrected: buffer overflow when showing intercepted processes in the system tray menus[*]corrected: a huge list of command line parameters for an intercepted process could had caused a buffer overflow in AdvOR.dll[*]address map registrations are now scheduled when they are changed from the "Associate addresses" page[*]new configuration option: SocksAuthenticator[*]new option on the "Proxy" page: "User:password" (SocksAuthenticator) that allows restricting the access to the local proxy with an username:password combination (all proxy protocols are supported)[*]if a prefix is entered for the .onion address when registering a new hidden service, an address name generator will try to find an address that starts with that prefix; the address generator shows a progress and it can be stopped anytime[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October 2nd[*]updated language strings: 1248, 3222, 3223, 3224, 3225, 3226, 3227, 3228, 3229, 3230, 3231[/list]2012-09-12 Advanced Onion Router 0.3.0.11a[list][*]correcte[list][*]corrected: when clearing temporary address maps, the same buff wher could hadn been freed twice frommapping an address, different threads (thanks toa anonymoplus forgin rexporting this erred AdvTor_TranslateAddress(), the onew_address spart of. an addret)[*]geoip_c.ssmap_entry_t structure was freed without undating it with the new remapped address; this error caused random crashes when as u pdatedlugin with GeoIPCthat exported AdvTor_TranslateAddress() (like the Blacklist plugin) was loaded (thanks to anonymounts for reporyWting thois.csv releas edrror on Septembern 5thsf.net)[*]the value for the source code file name pointer is written to AdvOR-crash.txt instead of the file name pointed by it[*]upAdvOR.dll increases the reference count for WS2_32.dll to prevent an intercepteda applicateion from unloading it[*]if more planguage strings: 2915 (typo rexport TranslateAddress and have the right to translate addresses, the address that was remapped by anonymo plugins is rewritten only on snce, after all plugins events handlers are called[*]AdvOR no longer formats useless controller messages if no controller is connected[*]updated libraries: libevent-2.0.20-stable, openssl-1.0.1c[*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October 30t)h[/list]


2012-10-28 17:12:10
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. CThe program attempts to circumvents firewalls, website censorship, web tracking tools, and more. Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network.Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2012-10-28 17:11:36
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass firewalls, websvarious barriers with a secure, anonymous Internet connection. Circumvents firewalls, website censsorship, and, web tracking tools. It, and more. Allloows you to use enable secure, of anonylmouos connections with any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network.Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2012-10-28 10:40:04
Updated by SYSTEM

  • Version: v0.3.0.112b
  • System Requirement:
  • Size (in bytes): 10047626914
  • What's new: [list][*][tor-20.2.12.38]-10-19 Advoid read-from-freed-memory and double-freanced bugs that couldOnion occur when a DNS request fails while launching iRout. Fixes bug 6480; bugfix onr 0.2.0.3.0.1-a2b[lpha.ist][*][corrector-0.2.2.38] Aed: buffer overfloiw in dir_split_resource_into_fingerprints() (thanks uninito anonymous for reportializeng this error on sf.net)[*]corrected m: when the emontry read when reading a vote or consensus document that has an "No exit" was selected, AdvOR tried to use a country from GeoIP when changing the identity[*]added extra memory checks in addressmap_ent_free() and in aes_free_cipher() to get better error reports for 2 bugs reported on sf.net forums[/list]2012-10-17 Advanced Onion Router 0.3.0.12a[list][*]corrected: the function start_of_month() was not updated to use tor_timegm() with its new syntax (thanks to anonymous for reporting this error on sf.net)[*]corrected: the original address of a socks request was not always set for requests made by intercepted programs that were also configured to use AdvOR as a proxy[/list]2012-10-16 Advanced Onion Router 0.3.0.12[list][*][tor-0.2.2.39] Fix an assertion failure in tor_timegm() that could be triggered by a badly formatted directory object. Bug found by fuzzing with Radamsa. Fixes bug 6811; bugfix on 0.2.0.20-rc.[*][tor-0.2.2.39] Do not crash when comparing an address with port value 0 to an address policy. This bug could have been used to cause a remote assertion failure by or against directory authorities, or to allow some applications to crash clients. Fixes bug 6690; bugfix on 0.2.1.10-alpha.[*]corrected: buffer overflow when showing intercepted processes in the system tray menus[*]corrected: a huge list of command line parameters for an intercepted process could had caused a buffer overflow in AdvOR.dll[*]address map registrations are now scheduled when they are changed from the "Associate addresses" page[*]new configuration option: SocksAuthenticator[*]new option on the "Proxy" page: "User:password" (SocksAuthenticator) that allows restricting the access to the local proxy with an username:password combination (all proxy protocols are supported)[*]if a prefix is entered for the .onion address when registering a new hidden service, an address name generator will try to find an address that starts with that prefix; the address generator shows a progress and it can be stognizpped flavor naytimee[*]geoip_c.h was updated with TGeoIPCountryWhoiss.csv reareleased on Octoulber 2nd[*]upd leated to la remote crnguash bug. Fixe s butrings: 1248, 3222, 3223, 3224, 6530;225, bugfix on 0.2.322.6-alpha.[*], 3227, 3228, 3229, 3230, 3231[/listor-]2012-0.9-12.2.38] Try to leak less iAdvanced Onformatiion abRout what relays a client is choosing to a er 0.3.0.11a[liside-channel attacker. Previously, a Tor client would stop iterating through the list of available relays as soon as it had ][*]chosen one, thus finishing a little rrearlier cted: when it picklearing temporary address ma router earlier in the list. If an attacker can recover this timing information (nontrivial but not proven to be impossps, the same buffer could had been freed twible), they could learn some coarse-grained in foromat dion aboufferent t which relayeads a clien(t wahanks to anonymous for repickorting (mthis error on sf.net)[*]geoip_c.h was upddlate nodes in particular are likelier to be affected than exits). The timing attack might be mitigated by other factors (see bug 6537 for some discussion), bd with GeoIPCout it's best not to take cryWhanois.ces. Fixev releas bug 6537; bugfixed on 0.0.8 Septemberc1. 5th[*]new hot keys: "Hide all intercepted applications" and "Un-hide and resume hidden applications" (they are mutually exclusive: when one is upressed, it is unregistered dand the other is registered)[*]new confid langurationge opstriongs: HotkeyHideAll (default is `, disabled), Hotke: 2915 (typo reported byRestoreAll (default is Win+Ctrl+7, disabled)[*]new options anonymon the "System" page: "Hide all intercepted applications" (HotkeyHideAll), "Pause hidden applications" (H otkeyHideAll) and "Un-hide and resume hidden applications" (HotkeyRestoreAll)[*]geoip_c.h was updated with GeoIPCountryWhois sf.csv released on August 8th[*]updated languagne strings: 3211, 3212, 3213, 3214, 3215, 3216, 3217, 3218, 3219, 3220, 3221)[/list]


2012-09-06 08:54:58
Updated by SYSTEM

  • Version: Vv0.3.0.101
  • System Requirement:
  • Size (in bytes): 10007642914
  • What's new: [list][*][tor-0.2.2.37] Work around a bug in8] OpenSSLAvoid read-from-freed-memory and double-free bugs thatt could occur when a broke renegotiation with TLSDNS request fails while launching it. Fixes bug 6480; bugfix on 0.2.0.1.1 -alpha.[*][tor-0.2.2.38] Avoid an uninitialized memory read when reading a vote or consensus document that has an unrecognized flavor name. This read could lead to a remote crash bug. Fixes bug 6530; bugfix on 0.2.2.6-alpha.[*][tor-0.2.2.38] Try to leak less information about what relays a client is choosing to a side-channel attacker. Previously, a Tor client would stop iterating through the list of available relays as soon as it had chosen one, thus finishing a little earlier when it picked a router earlier ind TLS 1.2. Wthe list. If an attacker can recover this timing information (nontrivial but not proven to be impossible), they could learn some coarse-grained information about whichout threlays a client was picking (middle nodes in particular are likeliser wtorkaround, all be attffempts cto speak d the v2 Toran connectxion protocol whens). boThe timing atth sides were using OpenSSL 1.0.1 would fail. Resolves ticket 6033.[*][ mightor-0.2.2.37] Whben wait miting fated by other fa client to renes (see bug 6537 for sotiatme, don't allow it to add aiscussiony ), bytes uto the input buffer. This fixes a potential DoS issue. Fixes bugit's 5934 best not to take chand 6007;ces. Fixes bug 6537; bugfix oix on 0.2.00.8rc1.20- [*]new hot keys: "Hide all interc.epted applications" and "Un-hide and resume hidden applications" (they are mutually exclusive: when one is pressed, it is unregistered and the other is registered)[*][new configuration options: HotkeyHideAll (default is `, disabled), HotkeyRestor-0.2.2.37]reAll (default is FWix an en+Ctrl+7, dge case where if we fetch or pusablish a hidden service descriptor, wled)[*]ne mw optigons on the "System" buipage: "Hide all intercepted applications" (HotkeyHideAll), "Pause hidden applications" (HotkeyHideAll) and "Un-hide and resume hidden a 4-hop cplircuit and then use that circuit for exitiongs" af(HotkeyRerwards -- even if the new last hop doesn't obey ouor ExitNodes config option. Fixes bug 5283; bugfix on 0.2.0.10-aAlpha.[l)[*][tor-0.2.2.37] Fix a builgeoip_c.h was updated warning with ith GeoIPClang 3.1 related to our ouse of vasprintf. FryWhoixes bug 5969. Bugfix on 0.2.2.11-alpha.[*][tor-0.2.2.37] Tell GCC and Cs.csv relang to check for any errors in format strings passed to the tor_v*(print|ascaed on)f fAuncgust 8tions.h[*]corrected: circuit_is_acceptable() could had returned a circuit with a wrong purpose (thanks to anonymous for reuporting this error on sf.net)[*]corrected: a circuit with a high priority could had been returned even when it had a wrong purpose (thanks to anonymous for reporting this error on sf.net)[*]updatdated language strings: 32011, 3212, 3213, 3214, 3215, 3216, 3217, 3218, 3219, 32120, 3221[/list]


2012-07-01 18:40:33
Updated by webfork

  • Synopsis:


2012-06-30 12:50:01
Updated by SYSTEM

  • Version: V0.3.0.910
  • License: [url=http://sourceforge.net/projects/advtor/develop]Varrioous Open Soururce[/url]
  • Synopsis: Advanced Onion Router is designed to bypass firewalls, website censorship, and web tracking tools. It allows you to use enable secure, anonymous connections with any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network.Noteork.Note: instinstructions for or making Tor or editioons of Opera, pera, Firefox, an and Chat are inclt are included in the "Help" directory.
  • How to extract: Download the ZIP package and extract to a folder of your choice. Launch [i]AdvOR.exe[/i].Optionally, go to the "System" menu in options and check "Try to write to disk less frequently". This is ideal for increasing the life of drives running from flash memory.
  • Size (in bytes): 10007606641
  • Download URL: http://hivelocity.dl.sourcrceforge.net/proet/projectts/advtor/AdvOR-0.3.0.9/AdvOR-0.3.0.9.zfiples/
  • Forum topic ID: 06816
  • What's new: 2012-06-08 Advanced Onion Router 0.3.0.9- [tor-0.2.2.35] Change IP address for maatuska (v3 directory authority).- [tor-0.2.2.35] Change IP address for ides (v3 directory authority), and rename it to turtles.- [tor-0.2.2.35] When building or running with any version of OpenSSL earlier than 0.9.8s or 1.0.0f, disable SSLv3 support. These OpenSSL versions have a bug (CVE-2011-4576) in which their block cipher padding includes uninitialized data, potentially leaking sensitive information to any peer with whom they make a SSLv3 connection. Tor does not use SSL v3 by default, but a hostile client or server could force an SSLv3 connection in order to gain information that they shouldn't have been able to get. The best solution here is to upgrade to OpenSSL 0.9.8s or 1.0.0f (or later). But when building or running with a non-upgraded OpenSSL, we disable SSLv3 entirely to make sure that the bug can't happen.- [tor-0.2.2.35] Never use a bridge or a controller-supplied node as an exit, even if its exit policy allows it. Found by wanoskarnet. Fixes bug 5342. Bugfix on 0.1.1.15-rc (for controller-purpose descriptors) and 0.2.0.3-alpha (for bridge-purpose descriptors).- [tor-0.2.2.35] Only build circuits if we have a sufficient threshold of the total descriptors that are marked in the consensus with the "Exit" flag. This mitigates an attack proposed by wanoskarnet, in which all of a client's bridges collude to restrict the exit nodes that the client knows about. Fixes bug 5343.- [tor-0.2.2.35] Provide controllers with a safer way to implement the cookie authentication mechanism. With the old method, if another locally running program could convince a controller that it was the Tor process, then that program could trick the contoller into telling it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE" authentication method uses a challenge-response approach to prevent this attack. Fixes bug 5185; implements proposal 193.- [tor-0.2.2.35] Avoid logging uninitialized data when unable to decode a hidden service descriptor cookie. Fixes bug 5647; bugfix on 0.2.1.5-alpha.- [tor-0.2.2.35] Avoid a client-side assertion failure when receiving an INTRODUCE2 cell on a general purpose circuit. Fixes bug 5644; bugfix on 0.2.1.6-alpha.- [tor-0.2.2.35] Fix the SOCKET_OK test that we use to tell when socket creation fails so that it works on Win64. Fixes part of bug 4533; bugfix on 0.2.2.29-beta. Bug found by wanoskarnet.- [tor-0.2.2.35] Reject out-of-range times like 23:59:61 in parse_rfc1123_time(). Fixes bug 5346; bugfix on 0.0.8pre3.- [tor-0.2.2.35] Make our number-parsing functions always treat too-large values as an error, even when those values exceed the width of the underlying type. Previously, if the caller provided these functions with minima or maxima set to the extreme values of the underlying integer type, these functions would return those values on overflow rather than treating overflow as an error. Fixes part of bug 5786; bugfix on 0.0.9.- [tor-0.2.2.35] Correct parsing of certain date types in parse_http_time(). Without this patch, If-Modified-Since would behave incorrectly. Fixes bug 5346; bugfix on 0.2.0.2-alpha. Patch from Esteban Manchado Velazque[lis.- [tor-0.2.2.35] Change the BridgePassword feature (part of the "bridge community" design, which is not yet implemented) to use a time-independent comparison. The old behavior might have allowed an adversary to use timing to guess the BridgePassword value. Fixes bug 5543; bugfix on 0.2.0.14-alpha.- [*][tor-0.2.2.2.357] Detect and reject certain misformed escape sequences in configuration values. Previously, these values would cause us to crash if received in a torrc file or over an authenticated control port. Bug found by Esteban Manchado Velazquez, and independently by Rob Work around a bug in OpenSSL that broke renert Connolly from Matta Consulting who further noted that it allows a post-authenticatiation witheap overflowTLS 1.1 and TLS 1.2. Pa Without tchis workaround, all attempts by Alexto speandek the v2 Tor Schrijver. Fixes bugs 5090 and 5402 (CVE 2012-1668); bugfix on 0.2.0.16-alpha.- [tor-0.2.2.35] When sending an HTTP/1.1 proxy request, include a Hosonnection protocol when both heasides wer. Fixe us buing 5593; bugfix oOpen SSL 1.0.2.2.1- would fail. Resolpha.-ves ticket 6033.[*][tor-0.2.2.2.357] F When waitix ang for a NULL-pclient to renegotinater dereference , don a b't adlylow it ftormed SETCIRCUITPURPOSE command. Found by mikeyc. Fixes bug 5796; bugfix on 0.2.2.9-alpha.- [tor-0.2.2.35] If we hit the error case where routerlist_insert() replaces an existing (old) server descriptor, make sure to remove that server descriptor from the old_routers list. Fix related to bug 1776. Bugfix on 0.2.2.18-alpha.- [tor-0.2.2.35] Directory authorities now reject versions of Tor older than 0.2.1.30, and Tor versions between 0.2.2.1-alpha and 0.2.2.20-alpha inclusive. These versions accounted for only a small fraction of the Tor network, an add have numerous knowny bytesecuri ty issues. Ro the input buffer. This fixeso a potentialv DoS issue. Fixes issue bugs 5934 and 600788.-; bugfix on 0.2.0.20-rc.[*][tor-0.2.2.357] Feature removal: When sending or relayinix an edge case where if we fetch or publish a hidden service descriptor, we might build a 4-hop circuit and then use that circuit for exiting afterwards -- even if the new last hop doesn't obey our ExitNodes config option. Fixes bug 5283; bug a RELAY_EARLY cell, we used to convert it to a RELAY cell if the connectfix on was using the v0.2.0.1 0-alink proha.[*][tocolr-0.2.2. This was 37] Fix a build workaround for older versions of Tor,ing which didn'th hClandg 3.1 relate RELAY_EARLY cells pd to our use of vasperlyintf. Now that all s Fixes bug 5969. Bupported versgfions can handle RELAY_EARLY cells, andx now that we'ren enforcing the0.2.2.11-alpha.[*][tor-0.2.2.37] Tell GCC "anod RELAY_EXTEND commClands except in RELAY_EARLYg to chells" rule, remove thisck wforkarou any errors ind. Addformat stresses bug 4786.- ingeoip_c.h was updatssed wito the GeoIPCtor_v*(print|scan)f functiountrns.[*]corrected: circuit_is_acceptable() could had returned a circuit with a wrong purpose (thanks to anonyWhomous for reporting this error on sf.net)[*]corrected: a circsvuit with a high preiority coulead had been returned even when it had a wrong purpose (thanks to anonymous for reporting this error on sf.net)[*]updated on Julane 6th- updated langguage strings: 3085, 3086, 3205, 32069, 32107, 3208[/list]


2012-06-13 13:06:07
Updated by Magibon

  • Website URL: http://nemesis.te-homsourceforge.net/Prt/projects/AadvTtor.html/
  • Version: V0.3.0.8a9
  • Synopsis: Advanced Onion Router is designed to bypass firewalls, website censorship, and web tracking tools. It at alloowss you to use enable to usecure, anonym enable secure, anonymouss coconnectionsns with a any ap application thacation that connnects to to the e Intnternet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the Tor network.Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.
  • Size (in bytes): 10017056066
  • Download URL: http://downhiveloads.sourceforge.net/projecit/advtor/AdvOR-0.3.0.8/AdvOR-0.3.0.8ay.dl.zip?r=http%3A%2F%2Fsourceeforgee.net%2Fet/projects%2F/advtor%2Ffiles%2F/AdvOR-0.3.0.8%2F&ts=139/AdvOR-0.382224.0.95&use_mirror=.ziwebp
  • What's new: 2012-06-08 Advanced Onion Router 0.3.0.9- [tor-0.2.2.35] Change IP address for maatuska (v3 directory authority).- [tor-0.2.2.35] Change IP address for ides (v3 directory authority), and rename it to turtles.- [tor-0.2.2.35] When building or running with any version of OpenSSL earlier than 0.9.8s or 1.0.0f, disable SSLv3 support. These OpenSSL versions have a bug (CVE-2011-4576) in which their block cipher padding includes uninitialized data, potentially leaking sensitive information to any peer with whom they make a SSLv3 connection. Tor does not use SSL v3 by default, but a hostile client or server could force an SSLv3 connection in order to gain information that they shouldn't have been able to get. The best solution here is to upgrade to OpenSSL 0.9.8s or 1.0.0f (or later). But when building or running with a non-upgraded OpenSSL, we disable SSLv3 entirely to make sure that the bug can't happen.- [tor-0.2.2.35] Never use a bridge or a controller-supplied node as an exit, even if its exit policy allows it. Found by wanoskarnet. Fixes bug 5342. Bugfix on 0.1.1.15-rc (for controller-purpose descriptors) and 0.2.0.3-alpha (for bridge-purpose descriptors).- [tor-0.2.2.35] Only build circuits if we have a sufficient threshold of the total descriptors that are marked in the consensus with the "Exit" flag. This mitigates an attack proposed by wanoskarnet, in which all of a client's bridges collude to restrict the exit nodes that the client knows about. Fixes bug 5343.- [tor-0.2.2.35] Provide controllers with a safer way to implement the cookie authentication mechanism. With the old method, if another locally running program could convince a controller that it was the Tor process, then that program could trick the contoller into telling it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE" authentication method uses a challenge-response approach to prevent this attack. Fixes bug 5185; implements proposal 193.- [tor-0.2.2.35] Avoid logging uninitialized data when unable to decode a hidden service descriptor cookie. Fixes bug 5647; bugfix on 0.2.1.5-alpha.- [tor-0.2.2.35] Avoid a client-side assertion failure when receiving an INTRODUCE2 cell on a general purpose circuit. Fixes bug 5644; bugfix on 0.2.1.6-alpha.- [tor-0.2.2.35] Fix the SOCKET_OK test that we use to tell when socket creation fails so that it works on Win64. Fixes part of bug 4533; bugfix on 0.2.2.29-beta. Bug found by wanoskarnet.- [tor-0.2.2.35] Reject out-of-range times like 23:59:61 in parse_rfc1123_time(). Fixes bug 5346; bugfix on 0.0.8pre3.- [tor-0.2.2.35] Make our number-parsing functions always treat too-large values as an error, even when those values exceed the width of the underlying type. Previously, if the caller provided these functions with minima or maxima set to the extreme values of the underlying integer type, these functions would return those values on overflow rather than treating overflow as an error. Fixes part of bug 5786; bugfix on 0.0.9.- [tor-0.2.2.35] Correct parsing of certain date types in parse_http_time(). Without this patch, If-Modified-Since would behave incorrectly. Fixes bug 5346; bugfix on 0.2.0.2-alpha. Patch from Esteban Manchado Velazques.- [tor-0.2.2.35] Change the BridgePassword feature (part of the "bridge community" design, which is not yet implemented) to use a time-independent comparison. The old behavior might have allowed an adversary to use timing to guess the BridgePassword value. Fixes bug 5543; bugfix on 0.2.0.14-alpha.- [tor-0.2.2.35] Detect and reject certain misformed escape sequences in configuration values. Previously, these values would cause us to crash if received in a torrc file or over an authenticated control port. Bug found by Esteban Manchado Velazquez, and independently by Robert Connolly from Matta Consulting who further noted that it allows a post-authentication heap overflow. Patch by Alexander Schrijver. Fixes bugs 5090 and 5402 (CVE 2012-1668); bugfix on 0.2.0.16-alpha.- [tor-0.2.2.35] When sending an HTTP/1.1 proxy request, include a Host header. Fixes bug 5593; bugfix on 0.2.2.1-alpha.- [tor-0.2.2.35] Fix a NULL-pointer dereference on a badly formed SETCIRCUITPURPOSE command. Found by mikeyc. Fixes bug 5796; bugfix on 0.2.2.9-alpha.- [tor-0.2.2.35] If we hit the error case where routerlist_insert() replaces an existing (old) server descriptor, make sure to remove that server descriptor from the old_routers list. Fix related to bug 1776. Bugfix on 0.2.2.18-alpha.- [tor-0.2.2.35] Directory authorities now reject versions of Tor older than 0.2.1.30, and Tor versions between 0.2.2.1-alpha and 0.2.2.20-alpha inclusive. These versions accounted for only a small fraction of the Tor network, and have numerous known security issues. Resolves issue 4788.- [tor-0.2.27 A.35] Feature removal: When sending or relaying a RELAY_EARLY cell, we used to convert it to a RELAY cell if the connection was using the v1 link protocol. This was a workaround for older versions of Tor, which didn't handle RELAY_EARLY cells properly. Now that all supported versions can handle RELAY_EARLY cells, and now that we're enforcing the "no RELAY_EXTEND commands except in RELAY_EARLY cells" rule, removae this workarouncd. Addresses bug 4786.- gedoip_c.h was Onupdated wionth RoGeoIPCounter 0ryWhois.3.0.8a- cosv rreceleased on June 6th- updated: the buffer allocated for socks reqnguests was not initialized whgen calling AdvOR.dll (thank s to anonymous for reporting this: 3085, 3086, 3205, 3206, error on3207, sf.net)3208


2012-06-02 16:33:03
Updated by webfork

  • Synopsis: Advanced Onion Router allois designed to bypass firewalls, website censorship, and web tracking tools. It allows you to use enable secure, anonymous connections with any application that connects to the Internet. Unlike similar clients ythat require a configurable prou to use enxy, AOR is able secu to "force," a anpronygramo to use the Tor network.Note: coinnestructions wfor making Tor edith aionys of aOpplicerati, Firefon thatx, conanectsd to tChe Internet. The program frequenatly byp asses firewalls and website censorship. Unlike sim ilar ncluded ients tn that require a configurable proxy, AOR is able to "force" a program to use the TOR network.Note: in "HHelp" directory aire instructions fory. making TOR editions of Opera, Firefox, and Chat.


2012-05-28 16:30:46
Updated by Magibon

  • Version: V0.3.0.7b8a
  • Synopsis: Advanced Onion Router allows you to use enable secure, anonymous connections with any application that connects to the Internet. The program frequently bypasses firewalls and website censorship. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR network.The author includes information on how to use AdvOR with the browser bunNote: in "Help" dle from torprojeirect.org (Firefox) as well as how to make a portable "TORry browsarer" instructions for making TOR editions of Opeera, Firefox, and Chat.
  • Size (in bytes): 988834210017050
  • Download URL: http://sourceforgedownloads.sourceforge.net/project/advtor/AdvOR-0.3.0.8/AdvOR-0.3.0.8a.zip?r=http%3A%2F%2Fsourceforge.net/%2Fprojects/%2Fadvtdvtor/%2Ffiles/%2FAdvOR-0.3.0.7/AdvOR-0.8%2F&ts=13.0.7b.zip/d38222495&use_mirror=iwnloadeb
  • What's new: 2012-045-22 7 Advanceed Onion Routernion Router 0.30.03.7b- added an exception handler that can save a full stack backtrace to help reporting crashes (seh.c)- new command line parameter: --no-seh which disables the built-in exception handler- geoip_c.h was upd0.8ated with GeoIPCountryWhois.- csv released on April 3rd- updarected : the buffer allocangted for socks requests wags not initialized when calling AdvOR.dll (thanks to anonymous for reportings: 46this error on sf.net)


2012-04-25 18:07:21
Updated by Magibon

  • Version: V0.3.0.7ab
  • Size (in bytes): 978883499172
  • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.3.0.7/AdvOR-0.3.0.7ab.zip/download
  • What's new: 2012-024-20 2 Advaanceded Onion Router 0.3. 0.3.0.7b- added an exception handler that can save a full stack backtrace to help reporting crashes (seh.c)- new correctemmand: tlimeradd() ande tiparamersub() used wrong operands for updating microseter: --no-seh which disables the built-in exconds (bugfixeption for AdvOR and Tor, all versions)- corrected: buffer overflow when loading language files for plugins (thanks to Re4 for reporting this error and for sharing test language files that hendlped reproducing this error)- geoip_c.h was updateas updated witith GeoeoIPCountryWhois.csv released on Febrn April 3rd- updated language stry 2indgs: 46


2012-03-07 08:20:18
Updated by Magibon

  • Version: V0.3.0.7a
  • Size (in bytes): 9714991667
  • Download URL: http://souperb-sea2.dl.sourcefrceforge.net/e.net/project/advts/advtor/files/AdvOR-0.3.0.7/R-0.3.0.7/AdvOR-0.30.3.0..7a.zip/download
  • What's new: 20112-02-12-20 0 Advanced Onion Router 0.3.0.7- corrected a change from version 0.3.0.6 in tor_addr_port_parse() that caused it to return errors when parsing proxy IP addresses (thanks to anonymous11 for reporting this error)- improved the search algorithm for addresses that are added to the context menus related to strings selected in the "Debug" window- all router selection dialogs will show bandwidth capacities instead of bandwidth rates for routers that are not banned- the lists with fadvorite routers and with banned routers are no longcerd limOnitedon tRouter 6550.36.0.7a- chaorraecters- added instructions for using TorChat with AdvOR and configurad: timeradd() and tion samplersub() used to AdvOR\Help\TwrorChatng (opereandme.s for updating microseconds (bugfixt, for AdvdvOR. and Tor, all versions)- corrected: buffer overflow when loading language files for plugins (thanks to Re4 for reporting this error and for sharing test language files thand tor helped reproducing this error)- geoip_c.tx.h was updated wit)h GeoIPCountryWhois.csv released on February 2nd


2011-12-22 08:02:18
Updated by Magibon

  • Screenshot: Updated


2011-12-22 07:59:46
Updated by Magibon

  • Download URL: http://superb-sea2.downloads.sourc.sourceforge.nee.net/project/t/advdvtor/AdvOR-0.3.0.7/AdvOR-0.3.0.7.zip?r=&ts=13245407/AdvOR-0.3.0&use_m.7.zirror=superb-sea2


2011-12-22 07:59:19
Updated by Magibon

  • Download URL: http://idoweb.dnl.sourceforgoads.sourceforge.net/proet/project/advt/advtor/AdvOR-0.3.0.7/AdvOR-0./AdvOR-0.3.0.7.zip?r=&ts=132454073.0.7.z&use_mirror=superb-sea2


2011-12-22 07:58:31
Updated by Magibon

  • Version: V0.3.0.67
  • Size (in bytes): 9710447166
  • Download URL: http://iweb.dl.sourcrceforge.net/proet/projectst/advtor/fAdvOR-0.3.0.7/AdvOR-0.3.0.7.ziles/p
  • What's new: [tor-0.2.2.35] (this change was not applied because AdvOR already had a better fix since 0.3.0.4b) Fix a heap overflow bug that could occur when trying to pull data into the first chunk of a buffer, when that chunk had already had some data drained from it. Fixes CVE-2011-2778; bugfix on 0.2.0.16-alpha. Reported by "Vektor". [tor-0.2.2.35] Initialize Libevent with the EVENT_BASE_FLAG_NOLOCK flag enabled, so that it doesn't attempt to allocate a socketpair. This could cause some problems on Windows systems with overzealous firewalls. Fix for bug 4457; workaround for Libevent versions 2.0.1-alpha through 2.0.15-stable. [tor-0.2.2.35] If we mark an OR connection for close based on a cell we process, don't process any further cells on it. We already avoid further reads on marked-for-close connections, but now we also discard the cells we'd already read. Fixes bug 4299; bugfix on 0.2.0.10-alpha, which was the first version where we might mark a connection for close based on processing a cell on it. [tor-0.2.2.35] Correctly sanity-check that we don't underflow on a memory allocation (and then assert) for hidden service introduction point decryption. Bug discovered by Dan Rosenberg. Fixes bug 4410; bugfix on 0.2.1.5-alpha. [tor-0.2.2.35] Fix a memory leak when we check whether a hidden service descriptor has any usable introduction points left. Fixes bug 4424. Bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] Detect failure to initialize Libevent. This fix provides better detection for future instances of bug 4457. [tor-0.2.2.35] Avoid frequent calls to the fairly expensive cull_wedged_cpuworkers function. This was eating up hideously large amounts of time on some busy servers. Fixes bug 4518; bugfix on 0.0.9.8. [tor-0.2.2.35] Resolve an integer overflow bug in smartlist_ensure_capacity(). Fixes bug 4230; bugfix on Tor 0.1.0.1-rc. Based on a patch by Mansour Moufid. [tor-0.2.2.35] When configuring, starting, or stopping an NT service, stop immediately after the service configuration attempt has succeeded or failed. Fixes bug 3963; bugfix on 0.2.0.7-alpha. [tor-0.2.2.35] When sending a NETINFO cell, include the original address received for the other side, not its canonical address. Found by "troll_un"; fixes bug 4349; bugfix on 0.2.0.10-alpha. [tor-0.2.2.35] Fix a memory leak in launch_direct_bridge_descriptor_fetch() that occurred when a client tried to fetch a descriptor for a bridge in ExcludeNodes. Fixes bug 4383; bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] If we had ever tried to call tor_addr_to_str on an address of unknown type, we would have done a strdup on an uninitialized buffer. Now we won't. Fixes bug 4529; bugfix on 0.2.1.3-alpha. Reported by "troll_un". [tor2011-0.2.2.35] Correctly detect and handle transient lookup failures from tor_addr_lookup. Fixes bug 4530; bugfix on 0.2.1.5-alpha. Reported by "troll_un". [tor-0.2.2.35] Fix null-pointer access that could occur if TLS allocation failed. Fixes bug 4531; bugfix on 0.2.0.20-rc. Found by "troll_un". [tor-0.2.2.35] Use tor_socket_t type for listener argument to accept(). Fixes bug 4535; bugfix on 0.2.2.28-beta. Found by "troll_un". [tor-20.2.2.35] Add two new config options for directory authorities: AuthDirFastGuarantee sets a bandwidth threshold for guaranteeing the Fast flag, an Ad AuthDirGuardBWGuarantee sets a bandwidth threshold that is always suffivancient to satisfy the bandwidth requirement for thed Guard flagOnion Router 0.3.0. Now it will be easier for researchers to simula7- corrected Tor networks wita ch difange ferent values.om Resolvers ticket 4484on 0.3.0.6 in cotor_addr_port_parsec() thated: caused it to return errors whe ORn parsing prortxy IP waddres set while initializing keys (thanks to DavidWaks to anonymous11 for reporting this error)- improved the search algorin thm for addreporting this error) updses that are added to the context menus related to strings selected in the "Debug" window- all router selection dialogs willa show bandwidth capacities instead of bangudwidth rates for routers that are not banned- the lists with favorite routers and with bagenned routerst are no longer limited to 65536 characters- added instructions for using TorChat with AdvOR and configs:uration 3201samples to AdvOR\Help\TorChat (readme.txt, 3202AdvOR.ini and torrc.txt).


2011-12-18 09:45:12
Updated by SYSTEM

  • Version: V0.3.0.56
  • Size (in bytes): 9710604647
  • What's new: correc[tedor-0.2.2.35] (this change was not applied because AdvOR already had a better fix since 0.3.0.4b) Fix a heap overflow bug that could occur when trying to pull data into the first chunk of a buffer, when that chunk had already had some data drained from it. Fixes CVE-2011-2778; bugfix on 0.2.0.16-alpha. Reported by "Vektor". [tor-0.2.2.35] Initialize Libevent with the EVENT_BASE_FLAG_NOLOCK flag enabled, so that it doesn't attempt to allocate a socketpair. This could cause some problems on Windows systems with overzealous firewalls. Fix for bug 4457; workaround for Libevent versions 2.0.1-alpha through 2.0.15-stable. [tor-0.2.2.35] If we mark an OR connection for close based on a cell we process, don't process any further cells on it. We already avoid further reads on marked-for-close connections, but now we also discard the cells we'd already read. Fixes bug 4299; bugfix on 0.2.0.10-alpha, which was the first version where we might mark a connection for close based on processing a cell on it. [tor-0.2.2.35] Correctly sanity-check that we don't underflow on a memory allocation (and then assert) for hidden service introduction point decryption. Bug discovered by Dan Rosenberg. Fixes bug 4410; bugfix on 0.2.1.5-alpha. [tor-0.2.2.35] Fix a memory leak when we check whether a hidden service descriptor has any usable introduction points left. Fixes bug 4424. Bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] Detect failure to initialize Libevent. This fix provides better detection for future instances of bug 4457. [tor-0.2.2.35] Avoid frequent calls to the fairly expensive cull_wedged_cpuworkers function. This was eating up hideously large amounts of time on some busy servers. Fixes bug 4518; bugfix on 0.0.9.8. [tor-0.2.2.35] Resolve an integer overflow bug in smartlist_ensure_capacity(). Fixes bug 4230; bugfix on Tor 0.1.0.1-rc. Based on a patch by Mansour Moufid. [tor-0.2.2.35] When configuring, starting, or stopping an NT service, stop immediately after the service configuration attempt has succeeded or failed. Fixes bug 3963; bugfix on 0.2.0.7-alpha. [tor-0.2.2.35] When sending a NETINFO cell, include the original address received for the other side, not its canonical address. Found by "troll_un"; fixes bug 4349; bugfix on 0.2.0.10-alpha. [tor-0.2.2.35] Fix a memory leak in launch_direct_bridge_descriptor_fetch() that occurred when a client tried to fetch a descriptor for a bridge in ExcludeNodes. Fixes bug 4383; bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] If we had ever tried to call tor_addr_to_str on an address of unknown type, we would have done a strdup on an uninitialized buffer. Now we won't. Fixes bug 4529; bugfix on 0.2.1.3-alpha. Reported by "troll_un". [tor-0.2.2.35] Correctly detect and handle transient lookup failures from tor_addr_lookup. Fixes bug 4530; bugfix on 0.2.1.5-alpha. Reported by "troll_un". [tor-0.2.2.35] Fix null-pointer access that could occur if TLS allocation failed. Fixes bug 4531; bugfix on 0.2.0.20-rc. Found by "troll_un". [tor-0.2.2.35] Use tor_socket_t type for listener argument to accept(). Fixes bug 4535; bugfix on 0.2.2.28-beta. Found by "troll_un". [tor-0.2.2.35] Add two new config options for directory authorities: AuthDirFastGuarantee sets a bandwidth threshold for guaranteeing the Fast flag, and AuthDirGuardBWGuarantee sets a bandwidth threshold that is always sufficient to satisfy the bandwidth requiremen tt for the optie Guard flag. Non w ito reject .exitname.exitwill be easier for horestneames was enablrched, addresses that were mapped to exsit nodes wermulate Tor networks with different values. Resolves ticket 4484. corrected: the OR port was set while initialsoizing rkejectedys (thanks to DavidWakelin for reporting this problem) when the circuit path length is set to 1, the option "Do not use the public key step for the entry node" will be disabled new configuration options: CorporateProxy, Cofor rporateProxyDomain, CorporateProxyAuthenticator and CorporateProxyProtocol (supported protocols: NTLM) added support forting NTLM proxies (libntlm 1.3) new options on the "Bypass ISP filtering" page: "Always use this NTLM proxy" (Corpothis errorateProxy, CorporateProxyProtocol), "workstation@domain" (CorporateProxyDomain), "Account (username:password)" (CorupordateProxyAuthenticator) the NTLM proxy can be chained with ORProxy and/or DirProxy if needed; when enableed, the NTLM proxy is always the first proxy of a proxy chain updated language strings: 3191, 319 32, 3193, 3194, 3195, 3196, 3197, 3198, 30199, 32002


2011-12-16 11:23:09
Updated by SYSTEM

  • Website URL: http://sourceforgnemesis.te-home.net/prt/Projects/aAdvtTor/.html


2011-12-16 11:19:14
Updated by SYSTEM

  • Version: V0.3.0.4b5
  • Size (in bytes): 9670604698
  • What's new: corrected: when the option to reject .exitname.exit hostnames was enabled, addresses that were mapped to exit nodes were also rejected (thanks to DavidWakelin for reporting this problem) when the circuit path length is set to 1, the option "Do not use the public key step for the entry node" will be disabled new configuration options: CorporateProxy, CorporateProxyDomain, CorporateProxyAuthenticator and CorporateProxyProtocol (supported protocols: NTLM) added support for NTLM proxies (libntlm 1.3) new options on the "Bypass ISP filtering" page: "Always use this NTLM proxy" (CorporateProxy, CorporateProxyProtocol), "workstation@domain" (CorporateProxyDomain), "Account (username:password)" (CorporateProxyAuffthenticator) the NTLM proxy can be chained with ORProxy and/or DirProxy if needed; when enabled, the NTLM proxy is always the first proxy overfl a prow wxy cheain repupdated languacking the fstrirngst chunk: 3191, 3192, 3193, 3194, 3195, of3196, a3197, buf_t buffer (bugfix for AdvOR and Tor3198, all3199, versions)3200


2011-12-14 18:00:14
Updated by SYSTEM

  • Version: V0.3.0.4b
  • License: Various Open Source
  • Size (in bytes): 967438698
  • What's new: the option "Allow invalid certification authorities from certificates for bridges.torproject.org" was removed; on error, a message box will ask if the download should be retried ignoring unrecognized CA's the options TunnelDirConns (BOOL) and PreferTunneledDirConns (BOOL) were merged as TunnelDirConns (UINT) all procedures that handle proxy requests for OR and directory connections were moved to connection_proxy.c the options HttpsProxy, HttpsProxyAuthenticator, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername and Socks5ProxyPassword were merged as ORProxy, ORProxyAuthenticator and ORProxyProtocol (supported protocols: HTTPS, Socks4 and Socks5) added support for HTTPS, Socks4 and Socks5 proxies for HTTP directory connections the options HttpProxy and HttpProxyAuthenticator were replaced with DirProxy, DirProxyAuthenticator and DirProxyProtocol (supportcorred protocols: HTTP, HTTPS, Socks4 and Socks5) updated languageted: strings: 656, 2540, 2541, 2542, 2875, 2991, 2992, 2993, 2994, 2995, 2996, 2998, 3031, 3190 the instrbuctions for making a "Tor browser" with Firefox and the AdvOR.ini sample for Firefox were updated to work with the er overflatest "Tor Browser" package from torproject.orgwhen (tor-browser-2.2.34-3_en-US.exe) geoip_c.h was updated wcking th GeoIPCounte firyWst chounk of a buf_t buffer (bugfis.csx for Adv releOR asend Tonr, all Decembver 7thsions)


2011-12-11 13:45:02
Updated by SYSTEM

  • Version: V0.3.0.3b4
  • License: Various Open Source
  • Size (in bytes): 9674544386
  • What's new: the option "Allow invalid certification authorities from certificates for bridges.torproject.org" was removed; on error, a message box will ask if the download should be retried ignoring unrecognized CA's the options TunnelDirConns (BOOL) and PreferTunneledDirConns (BOOL) were merged as TunnelDirConns (UINT) all procedures that handle proxy requests for OR and directory connections were moved to connection_proxy.c the options HttpsProxy, HttpsProxyAuthenticator, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername and Socks5ProxyPassword were merged as ORProxy, ORProxyAuthenticator and ORProxyProtocol (supported protocols: HTTPS, Socks4 and Socks5) added support for HTTPS, Socks4 and Socks5 proxies for HTTP directory connections the options HttpProxy and HttpProxyAuthenticator were replaced with DirProxy, DirProxyAuthenticator and DirProxyProtocol (supported precoted:ocols: HTTP, HTTPS, Socks4 and Socks5) when aupdated duplicatnguage strouter was ings: 656, 2540, 2541, 2542, 2875, 2991, 2992, 2993, 2994, 2995, 2996, 2998, 3031, 3190 the instructions for making a "Tor browser" with Firefox and the AdvOR.ini sample for Firefox were updated to work with the latest "Tor Browser" package from torproject.org (tor-browser-2.2.34-3_en-US.exe) geoip_c.h was unpd athe plugins were notifiedd with a structure that was already freed (thanks to Neo for reporting this GerroIPCountr) correyWhois.cted:sv rerror loeaseding hiddeon service keys (thanks to DeepAnger for reporting cember 7this error)


2011-12-08 07:09:48
Updated by SYSTEM

  • Version: V0.3.0.3ab
  • License: Various Open Source
  • Size (in bytes): 967245447
  • What's new: corrected: hidden services are no longer added twice for versions 0 and 2 (support for version 0 was removed from tor-0.2.2.34); HiddenServiceVersion was removed new options on the "Connections" page: "Bandwidth rate per connection" (PerConnBWRate) and "Bandwidth burst per connection" (PerConnBWBurst) new options on the "Circuit build" page: "Learn circuit build timeout" (LearnCircuitBuildTimeout), "Stream timeout until trying a new circuit (seconds)" (CircuitStreamTimeout) and "Cell scale factor" (CircuitPriorityHalflife) new option on the "Become a server" page: "Refuse exit streams from unknown relays" (RefuseUnknownExits) new option on the "Private identity" page: "Reinitialize the global SSL context" (IdentityFlags&IDENTITY_FLAG_REINIT_KEYS, default value: IDENTITY_FLAG_REINIT_KEYS) the options AllowDotExit, HTTPFlags&HTTP_SETTING_REJECT_EXITNAME and HTTPFlags&HTTP_SETTING_REJECT_ONION were merged as AllowTorHosts (default value: ALLOW_DOT_ONION) the options "Reject requests for *.exitname.exit URL's" and "Reject requests for *.onion URL's" were moved from the "HTTP headers" page twhen a duplicate router was fo the "Banned addresses" page updateund language strings: 3020, 3181, 3182, 3183, 3184, 3185, 3186, 3187, 3188, 3189 corrected: when th the options to reject hosts endinlug with ".exitname.exit" or ".onion"s weree enablotified, with a structure that was already freed (the suffix wasanks to Neo for reporting this searror) corrected: error loading heidden from aservice keys (thanks to wrDeepAnger for reporting posi this erronr)


2011-12-04 15:00:15
Updated by SYSTEM

  • Version: V0.3.0.2b3a
  • License: Various Open Source
  • How to extract: Download the ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally, go to the "System" menu in options and check "Try to write to disk less frequently". This is ideal for increasing the life of drives running from flash memory.
  • Size (in bytes): 9672489147
  • Download URL: http://downloads.sourceforge.net/project/advtor/AdvOR-0.3.0.2sourceforge.net/AdvOR-0.3.0.2b.zip?r=http%3A%2F%2Fsourceforge.net%2Fprprojects%2Fts/advtor%2Ffiles%2FAdvOR-0.3.0.2%2F&ts=1322514628&use_mirror=/fiwlebs/
  • What's new: 2011-11-26 Advanced Onion Router 0.3.0.2b- corrected: when entering hibernation, directory connections were not closed- only routers that are not considered bad exits are added to the system tray menus unless they are added to favorites- routers that are marked as invalid/not running/fake will have their bandwidth rate prefixed by a question mark in the exit selection dialog2011-11-21 Advanced Onion Router 0.3.0.2a- a value of 0 for circuit build timeout / expiration time will cause the circuit to never expire- when downloading the network-status consensus, a failure to download from a directory server will cause a new download attempt from another directory server immediately if bootstrap_status is less than 802011-11-20 Advanced Onion Router 0.3.0.2- all files were updated with changes from tor-0.2.2.34 relative to tor-0.2.1.30; all changes were corrected to remove goto's and some bugs were fixed; all file I/O operations were modified to support UNICODE paths; latest versions of Tor consider excluded nodes a banlist if "StrictNodes" is set - however, AdvOR already considered excluded nodes a "strict" banlist since 0.1.0.x, so "StrictNodes" is used only for favorites- [tor-0.2.2.34] new configuration options: AllowDotExit, CellStatistics, LearnCircuitBuildTimeout, CircuitStreamTimeout, CircuitPriorityHalflife, ClientRejectInternalAddresses, ConsensusParams, ControlPortFileGroupReadable, ControlPortWriteToFile, ControlSocketsGroupWritable, DirReqStatistics, DisableAllSwap, EntryStatistics, ExitPortStatistics, ExtraInfoStatistics, FetchDirInfoExtraEarly, FetchV2Networkstatus, GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername, Socks5ProxyPassword, PerConnBWBurst, PerConnBWRate, RefuseUnknownExits, V3BandwidthsFile, __OwningControllerProcess, VoteOnHidServDirectoriesV2, _UsingTestNetworkDefaults, MinUptimeHidServDirectoryV2, AccountingSecondsToReachSoftLimit, AccountingSoftLimitHitAt, AccountingBytesAtSoftLimit- [tor-0.2.2.34] new state settings: BWHistoryReadMaxima, BWHistoryWriteMaxima, BWHistoryDirReadEnds, BWHistoryDirReadInterval, BWHistoryDirReadValues, BWHistoryDirReadMaxima, BWHistoryDirWriteEnds, BWHistoryDirWriteInterval, BWHistoryDirWriteValues, BWHistoryDirWriteMaxima, TotalBuildTimes, CircuitBuildAbandonedCount, CircuitBuildTimeBin, BuildtimeHistogram- [tor-0.2.2.34] configuration optio corrected: hidden services are no longer added twice for versions 0 and 2 (support for version 0 was removed from tor-0.2.2.34); HiddenServiceVersion was removed new options on the "Connections" page: "Bandwidth rate per connection" (PerConns that were removed: DirRecordUsageByCountry, DirRecordUsageGranularity, DirRecordUsageRetainIPs, DirRecordUsageSaveInterval, HSAuthorityRecordStats, RunTesting- [tor-0.2.2.34] the limits for HttpProxyAuthenticator and HttpsProxyAuthenticator were changed from 48 characters to 512 characters- updated libraries: libevent-2.0.16-stable, openssl-1.0.0e- geoip_c.h was updated with GeoIPCountryWhois.csv released on November 1st- updated language strings: 190, 191, 192, 230, 256, 270, 503, 504, 507, 608, 615, 616, 617, 618, 619, 620, 637, 639, 705, 1003, 1058, 1172, 1188, 1203, 1238, 1239, 1240, 1300, 1310, 1658, 1807, 1994, 2931, 2932, 2933, 2934, 2935, 2936, 2937, 2938, 2939, 2940, 2941, 2942, 2943, 2944, 2945, 2946, 2947, 2948, 2949, 2950, 2951, 2952, 2953, 2954, 2955, 2956, 2957, 2958, 2959, 2960, 2961, 2962, 2963, 2964, 2965, 2966, 2967, 2968, 2969, 2970, 2971, 2972, 2973, 2974, 2975, 2976, 2977, 2978, 2979, 2980, 2981, 2982, 2983, 2984, 2985, 2986, 2987, 2988, 2989, 2990, 2991, 2992, 2993, 2994, 2995, 2996, 2997, 2998, 2999, 3000, 3001, 3002, 3003, 3004, 3005, 3006, 3007, 3008, 3009, 3010, 3011, 3012, 3013, 3014, 3015, 3016, 3017, 3018, 3019, 3020, 3021, 3022, 3023, 3024, 3025, 3026, 3027, 3028, 3029, 3030, 3031, 3032, 3033, 3034, 3035, 3036, 3037, 3038, 3039, 3040, 3041, 3042, 3043, 3044, 3045, 3046, 3047, 3048, 3049, 3050, 3051, 3052, 3053, 3054, 3055, 3056, 3057, 3058, 3059, 3060, 3061, 3062, 3063, 3064, 3065, 3066, 3067, 3068, 3069, 3070, 3071, 3072, 3073, 3074, 3075, 3076, 3077, 3078, 3079, 3080, 3081, 3082, 3083, 3084, 3085, 3086, 3087, 3088, 3089, 3090, 3091, 3092, 3093, 3094, 3095, 3096, 3097, 3098, 3099, 3100, 3101, 3102, 3103, 3104, 3105, 3106, 3107, 3108, 3109, 3110, 3111, 3112, 3113, 3114, 3115, 3116, 3117, 3118, 3119, 3120, 3121, 3122, 3123, 3124, 3125, 3126, 3127, 3128, 3129, 3130, 3131, 3132, 3133, 3134, 3135, 3136, 3137, 3138, 3139, 3140, 3141, 3142, 3143, 3144, 3145, 3146, 3147, 3148, 3149, 3150, 3151, 3152, 3153, 3154, 3155, 3156, 3157, 3158, 3159, 3160, 3161, 3162, 3163, 3164, 3165, 3166, 3167, 3168, 3169, 3170, 3171, 3172, 3173, 3174, 3175, 3176, 3177, 3178, 3179, 31802011-08-08 Advanced Onion Router 0.3.0.1e- corrected: a negative status was assigned to an unsigned variable in proxy_handle_client_data()2011-08-05 Advanced Onion Router 0.3.0.1d- corrected: invalid pointer access if headers with different line terminators were received from a client in one request- corrected: when a web redirect was sent as a response for a request on a connection that was already associated with a different host the client was expected to close the connection causing some clients to wait indefinitely for the remote connection to be closed- the directory Tor-info was renamed to "Help" and the file tor-manual.html was removed; all text files related to the OR protocol were moved to Help\Tor- added a help file with explanations for all GUI settings and commands ("Help\AdvOWR.html", "Help\Img")- geoip_c.h was updated with GeoIPCountryWhois.csv released on August 4th2011-07-30 Advanced Onion Router 0.3.0.1c- HTTP servers that don't send any information about the length of the message they return for statuses that allow/require an entity to be returned are assumed to close the connection after sending the response (thanks to DeepAnger for reporting this problem)2011-07-30 Advanced Onion Router 0.3.0.1b- corrected: when processing server data, a wrong buffer size could had been returned to _connection_writte_to_buf_impl()- corrected: the capitalization for rewritten uTorrent HTTP headers did not match uTorrent's capitalization2011-07-28 Advanced Onion Router 0.3.0.1a- corrected the resize_info structure for the main dialog to make more room for child dialogs- uTorrent is now autodetected and its headers are re-generated as uTorrent headers (thanks to DeepAnger for reporting problems with some private trackers)- added uTorrent version pairs that are used to generate identity-dependent major browser versions when uTorre"Bant is detected- added: newwidth burowsert typer con necthe ion"HTTP head(PerConnBWBurst) new options" pagon the: "Circuit build" page: "Learn circuit build timeout"Mask (Lea BrnCircuitTorBuildTimeout), "Stream timeout until trying a new circuit (seconds)" (CircuitStreamTimenout) cand "Cell scalient fas uTctorrent" which can be used with B(CitTorrent cluitPriorityHalflife) new option on the "Become a server" page: "Refuse exit streams from unknown relays" (RefuseUnknownExients) new option on thate a"Preivate idenot supported ityet- u" page: "Reinitialize the global SSL context" (IdentityFlags&IDENTITY_FLAG_REINIT_KEYS, datedfault value: IDENTITY_FLAG_REINIT_KEYS) the options AllowDotExit, HTTPFlags&HTTP_SETTING_REJECT_EXITNAME and HTTPFlags&HTTP_SETTING_REJECT_ONION were merged as AllowTorHosts (default valangue: ALLOW_DOT_ONION) the options "Reject requests for *.exitnagme.exit URL's" and "Reject requests for *.onion URL's" were moved from the "HTTP headers" page to the "Banned addresses" page updated language strings: 3020, 3181, 31829, 3183, 3184, 30185, 3186, 3187, 3188, 3189 corrected: when the options to reject hosts ending with ".exitname.exit" or ".onion" were enabled, the suffix was searched from a wrong position


2011-11-28 21:22:19
Updated by webfork

  • License: Various Open Source
  • How to extract: Download the ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally, -- espgo to the "System" mecialnu in options and check "Try to write to disk less frequently ". This is ideal for increasing thhe life osf drives runnning the program f from m flash memory -- go to the "System" menu in options and check "Temory to write to disk less frequently".


2011-11-28 21:11:33
Updated by Magibon

  • Version: V0.3.0.1e2b
  • License: Various Open Source
  • Size (in bytes): 929648777914
  • Download URL: http://sourceforgedownloads.sourceforge.net/project/advtor/AdvOR-0.3.0.2/AdvOR-0.3.0.2b.zip?r=http%3A%2F%2Fsourceforge.net/%2Fprojects/%2Fadvtodvtor/%2Ffiles/%2FAdvOR-0.3.0.1/AdvOR-0.2%2F&ts=13.0.2251e.zip/d4628&use_mirror=iwnloadeb
  • What's new: 2011-11-26 Advanced Onion Router 0.3.0.2b- corrected: when entering hibernation, directory connections were not closed- only routers that are not considered bad exits are added to the system tray menus unless they are added to favorites- routers that are marked as invalid/not running/fake will have their bandwidth rate prefixed by a question mark in the exit selection dialog2011-11-21 Advanced Onion Router 0.3.0.2a- a value of 0 for circuit build timeout / expiration time will cause the circuit to never expire- when downloading the network-status consensus, a failure to download from a directory server will cause a new download attempt from another directory server immediately if bootstrap_status is less than 802011-11-20 Advanced Onion Router 0.3.0.2- all files were updated with changes from tor-0.2.2.34 relative to tor-0.2.1.30; all changes were corrected to remove goto's and some bugs were fixed; all file I/O operations were modified to support UNICODE paths; latest versions of Tor consider excluded nodes a banlist if "StrictNodes" is set - however, AdvOR already considered excluded nodes a "strict" banlist since 0.1.0.x, so "StrictNodes" is used only for favorites- [tor-0.2.2.34] new configuration options: AllowDotExit, CellStatistics, LearnCircuitBuildTimeout, CircuitStreamTimeout, CircuitPriorityHalflife, ClientRejectInternalAddresses, ConsensusParams, ControlPortFileGroupReadable, ControlPortWriteToFile, ControlSocketsGroupWritable, DirReqStatistics, DisableAllSwap, EntryStatistics, ExitPortStatistics, ExtraInfoStatistics, FetchDirInfoExtraEarly, FetchV2Networkstatus, GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername, Socks5ProxyPassword, PerConnBWBurst, PerConnBWRate, RefuseUnknownExits, V3BandwidthsFile, __OwningControllerProcess, VoteOnHidServDirectoriesV2, _UsingTestNetworkDefaults, MinUptimeHidServDirectoryV2, AccountingSecondsToReachSoftLimit, AccountingSoftLimitHitAt, AccountingBytesAtSoftLimit- [tor-0.2.2.34] new state settings: BWHistoryReadMaxima, BWHistoryWriteMaxima, BWHistoryDirReadEnds, BWHistoryDirReadInterval, BWHistoryDirReadValues, BWHistoryDirReadMaxima, BWHistoryDirWriteEnds, BWHistoryDirWriteInterval, BWHistoryDirWriteValues, BWHistoryDirWriteMaxima, TotalBuildTimes, CircuitBuildAbandonedCount, CircuitBuildTimeBin, BuildtimeHistogram- [tor-0.2.2.34] configuration options that were removed: DirRecordUsageByCountry, DirRecordUsageGranularity, DirRecordUsageRetainIPs, DirRecordUsageSaveInterval, HSAuthorityRecordStats, RunTesting- [tor-0.2.2.34] the limits for HttpProxyAuthenticator and HttpsProxyAuthenticator were changed from 48 characters to 512 characters- updated libraries: libevent-2.0.16-stable, openssl-1.0.0e- geoip_c.h was updated with GeoIPCountryWhois.csv released on November 1st- updated language strings: 190, 191, 192, 230, 256, 270, 503, 504, 507, 608, 615, 616, 617, 618, 619, 620, 637, 639, 705, 1003, 1058, 1172, 1188, 1203, 1238, 1239, 1240, 1300, 1310, 1658, 1807, 1994, 2931, 2932, 2933, 2934, 2935, 2936, 2937, 2938, 2939, 2940, 2941, 2942, 2943, 2944, 2945, 2946, 2947, 2948, 2949, 2950, 2951, 2952, 2953, 2954, 2955, 2956, 2957, 2958, 2959, 2960, 2961, 2962, 2963, 2964, 2965, 2966, 2967, 2968, 2969, 2970, 2971, 2972, 2973, 2974, 2975, 2976, 2977, 2978, 2979, 2980, 2981, 2982, 2983, 2984, 2985, 2986, 2987, 2988, 2989, 2990, 2991, 2992, 2993, 2994, 2995, 2996, 2997, 2998, 2999, 3000, 3001, 3002, 3003, 3004, 3005, 3006, 3007, 3008, 3009, 3010, 3011, 3012, 3013, 3014, 3015, 3016, 3017, 3018, 3019, 3020, 3021, 3022, 3023, 3024, 3025, 3026, 3027, 3028, 3029, 3030, 3031, 3032, 3033, 3034, 3035, 3036, 3037, 3038, 3039, 3040, 3041, 3042, 3043, 3044, 3045, 3046, 3047, 3048, 3049, 3050, 3051, 3052, 3053, 3054, 3055, 3056, 3057, 3058, 3059, 3060, 3061, 3062, 3063, 3064, 3065, 3066, 3067, 3068, 3069, 3070, 3071, 3072, 3073, 3074, 3075, 3076, 3077, 3078, 3079, 3080, 3081, 3082, 3083, 3084, 3085, 3086, 3087, 3088, 3089, 3090, 3091, 3092, 3093, 3094, 3095, 3096, 3097, 3098, 3099, 3100, 3101, 3102, 3103, 3104, 3105, 3106, 3107, 3108, 3109, 3110, 3111, 3112, 3113, 3114, 3115, 3116, 3117, 3118, 3119, 3120, 3121, 3122, 3123, 3124, 3125, 3126, 3127, 3128, 3129, 3130, 3131, 3132, 3133, 3134, 3135, 3136, 3137, 3138, 3139, 3140, 3141, 3142, 3143, 3144, 3145, 3146, 3147, 3148, 3149, 3150, 3151, 3152, 3153, 3154, 3155, 3156, 3157, 3158, 3159, 3160, 3161, 3162, 3163, 3164, 3165, 3166, 3167, 3168, 3169, 3170, 3171, 3172, 3173, 3174, 3175, 3176, 3177, 3178, 3179, 31802011-08-08 Advanced Onion Router 0.3.0.1e- corrected: a negative status was assigned to an unsigned variable in proxy_handle_client_data()2011-08-05 Advanced Onion Router 0.3.0.1d- corrected: invalid pointer access if headers with different line terminators were received from a client in one request- corrected: when a web redirect was sent as a response for a request on a connection that was already associated with a different host the client was expected to close the connection causing some clients to wait indefinitely for the remote connection to be closed- the directory Tor-info was renamed to "Help" and the file tor-manual.html was removed; all text files related to the OR protocol were moved to Help\Tor- added a help file with explanations for all GUI settings and commands ("Help\AdvOR.html", "Help\Img")- geoip_c.h was updated with GeoIPCountryWhois.csv released on August 4th2011-07-30 Advanced Onion Router 0.3.0.1c- HTTP servers that don't send any information about the length of the message they return for statuses that allow/require an entity to be returned are assumed to close the connection after sending the response (thanks to DeepAnger for reporting this problem)2011-07-30 Advanced Onion Router 0.3.0.1b- corrected: when processing server data, a wrong buffer size could had been returned to _connection_write_to_buf_impl()- corrected: the capitalization for rewritten uTorrent HTTP headers did not match uTorrent's capitalization2011-07-28 Advanced Onion Router 0.3.0.1a- corrected the resize_info structure for the main dialog to make more room for child dialogs- uTorrent is now autodetected and its headers are re-generated as uTorrent headers (thanks to DeepAnger for reporting problems with some private trackers)- added uTorrent version pairs that are used to generate identity-dependent major browser versions when uTorrent is detected- added: new browser type on the "HTTP headers" page: "Mask a BitTorrent client as uTorrent" which can be used with BitTorrent clients that are not supported yet- updated language strings: 2930


2011-11-11 21:35:39
Updated by webfork


    2011-08-29 15:21:14
    Updated by webfork

    • License: Various Open Source
    • Synopsis: Advanced Onion Router allows you to use enable secure, anonymous connections with any application that connects to the Internet. FThe program frequently bypasses firewalls and website censorship. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR network.The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) as well as how to make a portable "TOR browser" using Opera.


    2011-08-29 11:29:47
    Updated by Magibon

    • Version: V0.3.0.1e
    • Size (in bytes): 929818307477
    • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.3.0.1/AdvOR-0.3.0.1e.zip/download
    • What's new: 2011-07-22 Advanced Onion Router 0.3.0.1- new page: "HTTP headers" with options related to changing HTTP headers and showing HTTP requests and replies with or without full headers (LOG_NOTICE for headers, LOG_INFO for full HTTP traffic, original and adjusted)- setting a public proxy in a client and intercepting it will cause AdvOR to chain the OR exit with that proxy (to bypass Tor blacklists)- if proxy chains are detected, all requests for all proxies are rewritten to apply all configured restrictions for each proxy in a chain- if Opera Turbo traffic is detected in a proxy chain, Opera's unique identifier and the screen resolution that are sent to the Opera Turbo servers are replaced with identity-dependent random values- added support for keep-alive HTTP connections- added support for chunked HTTP transfers- added support for multipart HTTP content types- added support for identity-dependent fake HTTP headers with custom user-agent, regional settings, fake extensions, fake OS, etc.; can generate fake headers to mask a web browser as Chrome, Firefox, Internet Explorer, Opera, Safari, Bing bot, Googlebot, Yahoo! bot and Yandex bot- added options to show original and adjusted HTTP headers in Debug (LOG_INFO for full headers, LOG_NOTICE for requests)- all HTTP cookies that are received during an identity session are cached; the cookie cache is cleared when changing identities; all cookies that are not found in cache are filtered from HTTP requests- corrected: cookie lines were not always separated by new lines (thanks to Rex for reporting this error)- all dialogs that display a message show the message in an edit control with a vertical scroll bar (requested by TT)- when an application sends an HTTP request to a connection that is already attached to a circuit for a different host, HTTP status 302 is returned to cause the application to create a new connection for that request- corrected: when the option to select a random user8-agent using identity seeds is enabled, the browser type "unknown" is no longer selected (AdvOR 0.3.0.1 test 3)- added probabilities for all languages from all countries to increase chances of national languages being generated more often than languages spoken by minorities- fake IE extensions are generated using better frequencies taken from more header samples- the generators for fake HTTP headers for Chrome, Firefox, Opera and Safari were improved with more version pairs using HTTP header samples from http://useragentstring.com- the header "X-Requested-With" is no longer removed when the option to remove unknown headers is enabled- new option on the "Private Identity" page: "Disallow cookies used with previous identities"; if this option is enabled AdvOR itself will cache all cookies and expire them when the identity is changed; cookies that are not found in cache are removed from all requests- when the option to show full request headers is enabled, all HTTP traffic, including POST data, is logge8 Advanced if the log level is greater than "[6] Proxy"- corrected: some settings from the "HTTP headers" page were not saved to Adv OR.ini (thanks to Rex for reporting this problem)n (AdvORouter 0.3.0.1 test 5)- added restrictions fe- cor minimum widths rected: a negand heights for all child dialogs- addved scroll bars for all child dtatus was assialogs that are resizened too an dimeunsiognsed smvalriable in proxy_handler_client_data()2011-08-05 Advanced Onion Routhan mier 0.3.0.1d- corrected: invalid pointer access if headers with different line termum acinators were recepted ivalues (requested by TT)-ed from a client in one trequest- corrected: when a web redirect was sent as a response for a request on a connection that was already associated with a different host the client was expected to close the Blackonnection causing some clients t plugino was updaited to adind support efor scroll initely for the remote connection to bars-e closed- the directory Tor-info was renamed to "Help" and the file tor-manual.html was removed; all text files related to the OR protocol were moved to Help\Tor- added a help file with gexplanations for all GUI settip_c.h wasngs and upcommands ("Help\AdavOR.html", "Help\Img")- geoip_c.h was updated witith GeoIPCountountryWhoishois.csv released on August 4th2011-07-30 Advanced Onion Router 0.3.0.1c- HTTP serv relers that don't send any information about the length of the message they return for statusese that allow/require an entity to be returned are assumed to close the connection after sending the response (thanks to DeepAnger for reporting this problem)2011-07-30 Advanced Onion Router 0.3.0.1b- corrected: when processing server d ata, a wrong buffer size could had been returned to _connection_write_to_buf_impl()- corrected: the capitalization for rewritten uTorrent HTTP headers did not match JuTorrent's capitaly 5ization2011-07-28 Advanced Onion Router 0.3.0.1a- corrected the resize_info structure for th-e upmain dialog to make more room for child dialogs- uTorrent is now autodetected and its headers are re-generated as uTorrent headers (thanks to DeepAnger for reporting problems with some private trackers)- added uTorrent version pairs that are used to generated laidentity-dependent major browser versions when uTorrent is detected- added: new browser type on the "HTTP headers" page: "Mask a BitTorrent client as uTorrent" which can be used with BitTorrent clients that are not supported yet- updated language strings: 2896, 2897, 2898, 2899, 2900, 2901, 2902, 2903, 2904, 2905, 2906, 2907, 2908, 2909, 2910, 2911, 2912, 2913, 2914, 2915, 2916, 2917, 2918, 2919, 29230, 2921, 2922, 2923, 2924, 2925, 2926, 2927, 2928, 2929


    2011-07-23 07:57:58
    Updated by Magibon

    • License: Various
    • Screenshot: Updated


    2011-07-23 07:51:57
    Updated by webfork

    • Version: V0.3.0.01
    • License: Various Open Source
    • Synopsis: Advanced Onion Router allows you to use enable secure, anonymous connections with any application that connects to the Internet. Freequenently byp bypasses firewasses firewallls and nd website censorship. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR network.The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) as well as how to make a portable "TOR browser" using Opera.
    • Size (in bytes): 81830747209
    • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.3.0.01/AdvOR-0.0.3.0.0.1.zip/download
    • What's new: 2011-07-03 Advanced Onion Router 0.3.0.0- corrected: the parameter "--verify-lng" expected a language name instead of a language file name; now both are accepted (thanks to mamont for reporting this problem)- corrected: the selection "No exit" was shown as an invalid exit in window title and in the Debug window- if the option "Always on top" is enabled, popup message boxes are c22 Advanced Onion Router 0.3.0.1- new page: "HTTP headers" with options related to changing HTTP headers and showing HTTP reated with the MB_TOPMOST style- new functions for plugins: lang_get_string(), lang_change_dialog_squestrings() a and a new evrent for plugines: AdvTowith or_ without full headers (LanguageChange()- the Blacklist plugin is updated to version 1.02 with multi-language support; added an example language file Blacklist-English.lng- when hibernation mode is enabled, all connection requests from all intercepted processes are rejected and logged- the list with child dialogs was replaced with a tree view- some options from the "Proxy" page were moved to 2 different new pages: "Banned addresses" and "Advanced proxy settings"- the lists with banned routers and favorite routers were moved to 2 separate pages- tracked hosts and address maps were moved to a separate page- new page: "Private identity" with options related to changes that happen when changing identities- added an editor for QuickStart menus- when a process is not allowed to get the real local time, AdvOR.dll also intercepts FindFirstFileW and FindOG_NextFileW to adjust file times- added support for deleting Flash cookies, history, website personalizations and cache when changing identities- added support for deleting cookies saved by Internet Explorer, Chrome, Safari, Opera and Firefox when changing identities; cookie deletion procedures attempt to invoke browser API's via remote threads- geoip_c.h was updated with GeoTIPCountryWhois.csv released on June 2nd- the procedure that downloads bridges from https://bridges.torproject.org was rewritten to work with invalid certificates received from https://bridges.torproject.org- when disabling http/https proxies from the "AuthoE for headerities", dialog,LOG_INFO proxy addresses are no longer removed from configuration (requested by ktwh)- corrected: the function tor_malloc() was replaced with GlobalAlloc() which is thread-safe inor procedfull HTTP tres thatffic, coriginvert UTF-8 langal and adjuage strings for GUI items (thanks to mamont for rted)- seportiting tha publisc probxy in a cliem)- new option on the "Bypass ISP filtering" page: "Allow invalid certificationt and intercepting authorities for bridges.torproject.org" (defau willt is discabluse Ad fvOR tor schain thecurit OR exit with that proxy reasons; downloading the lis (t of bypass Toridges fblaickls when thists)- optif proxy chain is disablare detected if Inte, all requests for all proxies are rewrnitten to Exapply all configured restrictions for each proxy in a chain- if Opera Turbo traffic is detected in a proxy chain, Opera's unique identifier and the screen resolution that are sent to the Opera Turbo servers arere replacaed with identity-dependent ran't dom vealues- added support forify the ckertificate up to -a trustlive HTTP connections- added support for chunked HTTP transfers- added asupport for muthorltity -part HTTP when using WinIcontet functions for IE 6 on Windowtypes XP SP2/3)- if the languagdded strings 0 anupport for id/or 1248 contain lienks to tority-deproject.org tndent fake HTTP hey are removeead because some translations say torproject.org is the official website for AdvOR (complaints were received from torprojeth ct.org that some ustom users ask them r-agent, regional settings, fake extensions, fake OS, etc.; can generate fake heabout AdvTor/Advers to mask a web browser as Chrome, Firefox, Internet Explorer, ORpera, Safari, Bing bot, Googlebot, Yahoo! bot and Yandex bot- added oprtions to show obriginalems i and adjusted HTTP head of using ers in Debug (LOG_INFO four full headers, LOG_NOTICE for requmests)- cor all HTTP cookies that are received during an identity secssion are cached; the cookie cache is cleared: buffer overflow in plugin_load_lheng() (tchanks to mamont forging ridepornting this prties; all cooblem)- corrected: UNICODE language fkiles were not converted to UTF-8hat are not found in cache are filtered from HTTP requests- corrected: cookie lines were not always separated by new lines (thanks to Rex for reporting theis resrrource f)- all dialogs that display a message show the message in an edit control with a vertical scrolle w basr (requpesteda by TT)- when an application sends an HTTP request to a connection that is already attached to a circuit for a different host, HTTP status 302 is returned to inclaude tse the o apption "Allow invalid certificatatioon authoriti creates from certificates for brnew connection for that request- corrected: when the option to select a random user-agent using identity seeds is enabled, the browser type "unknown" is no longer selected (AdvOR 0.3.0.1 test 3)- added probabilities for all languages from all countries to increase chances of national languages being generated more often than languages spoken by minorities- fake IE extensions are generated using better frequencies taken from more header samples- the ges.nerators for fake HTTP headers for Chrome, Firefox, Oproject.org"- updaera and Safari were improved with more version pairs using HTTP header samples from htted langp://uagse ragentstrings: 1, 36, 50, 54, 59, 61, 97, 109, 110, 115, 117, 128, 130, 143, 144, 2677, 2799, 2800, 2801, 2802, 2803, 2804, 2805, 2806, 2807, 2808, 2809, 2810, 2811, 2812, 2813, 2814, 2815, 2816, 2817, 2818, 2819, 2820, 2821, 2822, 2823, 2824, 2825, 2826, 2827, 2828, 2829, 2830, 2831, 2832, 2833, 2834, 2835, 2836, 2837, 2838, 2839, 2840, 2841, 2842, 2843, 2844, 2845, 2846, 2847, 2848, 2849, 2850, 2851, 2852, 2853, 2854, 2855, 2856, 2857, 2858, 2859, 2860, 2861, 2862, 2863, 2864, 2865, 2866, 2867, 2868, 2869, 2870, 2871, 2872, 2873, 2874, 2875.com- the header "X-Requested-With" is no longer removeded when the option to remove unknown headers is enabled- new option on the "Private Identity" page: "Disamllow cookies used with previous identities"; if this option is enabled AdvOR it'self will cache all changes ookies and expire them when the identity is changed; cookies that are not found in cache are removed from all requests- when the option to show full request headers is enabled, all HTTP traffic, including POST data, is logged if the log level is greater than "[6] Proxy"- corrected: some settings from the "HTTP headers" page were not saved to AdvOR.ini (thanks to Rex for reporting this problem) (AddvOR-english 0.3.0.l1 test 5)- added restrictions for minimum widths and heights for all child dialogs- added scroll bars for speci all GUI effechild dialogs that are resized to dimensions smaller than minimum accepted values (requested by TT)- the Blacklist plugin was updated to add support for scroll bars- geoip_c.h was updated with GeoIPCountryWhois.csv released on July 5th- (updatedated language strings: 47, 2896, 2897, 2898, 2899, 2900, 2901, 2902, 2903, 2904, 2905, 2906, 2907, 2908, 2909, 2910, 2911, 2912, 2913, 2914, 2915, 2916, 2917, 2918, 2919, 2920, 2921, 2922, 2923, 2924, 29257, 5, 29, 260, 62, 124927, 2928, 2804, 2805, 92817)9


    2011-07-04 21:12:48
    Updated by Magibon

    • Synopsis: Advanced Onion Router is a client for thelows anonymoous TOR network that can connect applicatio use enable s without the need of ecure, a cnonfigured proxy required bny mous connections with any TOR clients. AOR is intended to be an improved aplternicativeon fthat connects tor the TOR+Vidalia+PInternet. Frivoxy bequendtle,y abypasses firewalls and website ce nsorship. Unlike similar clients thato "forc require" a configurable program andxy, AOR its able to "force" a pluroginsram to use the TOR network.The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) as well as how to make a portable "TOR browser" using Opera.


    2011-07-04 18:56:46
    Updated by Magibon

    • License: Various Open Source
    • Synopsis: Advanced Onion Router is a client for the TOR network that can anonymize applications without the need of a configured proxy required by most TOR clients. AOR is intended to be an improved alternatanonymous TOR network that can connect applications without the need of a configured proxy required by most TOR clients. AOR is intended to be an improved alternative for the TOR+Vidaalia+Privoxy bundle bundle, able le too "force" a prfogrce" a program and its plugins to pluginse th to use the TOR network.Additionally, thR ne authwor includes ik.The author includes information otion on how w to use AdvOR with the browser the browser bundlele from torpro torproject.oorg (Firefox) and/ors well as how to make a portable "TOR browser" using Opera.


    2011-07-04 02:37:12
    Updated by webfork

    • License: Various
    • Screenshot: Updated


    2011-07-04 02:30:05
    Updated by webfork

    • Version: V0.23.0.120
    • License: Various Open Source
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally -- especially for those running the program from flash memory -- go to the "System" menu in options and check "Try to write to disk less frequently".
    • Size (in bytes): 781680147209
    • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.23.0.120/AdvOR-0.2.0.123.0.0.zip/download
    • What's new: New release of Advanced Onion Router - version 02011-07-03 Advanced Onion Router 0.3.0.0- corrected: the parameter "--verify-lng" expected a language name instead of a language file name; now both are accepted (thanks to mamont for reporting this problem)- corrected: the selection "No exit" was shown as an invalid exit in window title and in the Debug window- if the option "Always on top" is enabled, popup message boxes are created with the MB_TOPMOST style- new functions for plugins: lang_get_string(), lang_change_dialog_strings() and a new event for plugins: AdvTor_LanguageChange()- the Blacklist plugin is updated to version 1.02 with multi-language support; added an example language file Blacklist-English.lng- when hibernation mode is enabled, all connection requests from all intercepted processes are rejected and logged- the list with child dialogs was replaced with a tree view- some options from the "Proxy" page were moved to 2 different new pages: "Banned addresses" and "Advanced proxy settings"- the lists with banned routers and favorite routers were moved to 2 separate pages- tracked hosts and address maps were moved to a separate page- new page: "Private identity" with options related to changes that happen when changing identities- added an editor for QuickStart menus- when a process is not allowed to get the real local time, AdvOR.dll also intercepts FindFirstFileW and FindNextFileW to adjust file times- added support for deleting Flash cookies, history, website personalizations and cache when changing identities- added support for deleting cookies saved by Internet Explorer, Chrome, Safari, Opera and Firefox when changing identities; cookie deletion procedures attempt to invoke browser API's via remote threads- geoip_c.h was updated with GeoIPCountryWhois.csv released on June 2nd- the procedure that downloads bridges from https://bridges.torproject.org was rewritten to work with invalid certificates received from https://bridges.torproject.org- when disabling http/https proxies from the "Authorities" dialog, proxy addresses are no longer removed from configuration (requested by ktwh)- corrected: the function tor_malloc() was replaced with GlobalAlloc() which is thread-safe in procedures that convert UTF-8 language strings for GUI items (thanks to mamont for reporting this problem)- new option on the "Bypass ISP filtering" page: "Allow invalid certification authorities for bridges.torproject.org" (default is disabled for security reasons; downloading the list of bridges fails when this option is disabled if Internet Explorer can't verify the certificate up to a trusted authority - when using WinInet functions for IE 6 on Windows XP SP2/3)- if the language strings 0 and/or 1248 contain links to torproject.org they are removed because some translations say torproject.0.12org is the official website for AdvOR (complaints were received from torproject.Corg that some users ask them about AdvTor/AdvOR problems instead of using our forums)- corrected: buffer overflow in plugin_load_lng() (thanks to mamont for reportinge this: problem)- correrected: when an UNICODE language file was loaded, list view subitems for hidden services and plugins were not updated corrected: since langguaage files were loaded using read_file_to_str(), language e files were opened in text mode and had CRLFre (\r\n)ot converted to LUTF (\n), which caused multi-line debug messages to be converted -8- tohe resource file wasingle-line messages the restriction for minimum circuit bandwidth rate now uses BandwidthCapacity instead of BandwidthRate (it uses what the router is known to handle instead of what the ro uter reported iat can handle) the window title will show "Ded to isconnected" when disconnecting from the OR network (sluggested by TT) new the option for circuit context menus on the "Network information" page: "Priority", which is used when deciding which circuits to use for a new client connection when more circuits with different priorities exist; low priority circuits are used only when no higher priority circuits are a"Allow invailable new option for circuitd context menus on the "Neertwork informication" pauthorities from certificates for bridge: s.torproject.org"Availability" which can be used to change expiration times or to prevent a manually built circuit from expiring (the default expiration time can be changed from the "Circuit build" page) new option on the "System" page: "Encrypt all settings using AES"; if this option is enabled, all configuration files are gzipped and encryp- updated usi lang a password or ua kgey fstrile and saved to AdvOR.dat, original configuration files are deleted; to revert the encryption and to save plain-text configuration files, after a successfull: 1, 36, 50, 54, 59, 61, 97, 109, 110, 115, 117, 128, 130, 143, 144, 2677, 2799, 2800, 2801, 2802, 2803, 2804, 2805, 2806, 2807, 2808, 2809, 2810, 2811, 2812, 2813, 2814, 2815, 2816, 2817, 2818, 2819, 2820, 2821, 2822, 2823, 2824, 2825, 2826, 2827, 2828, 2829, 2830, 2831, 2832, 2833, 2834, 2835, 2836, 2837, 2838, 2839, 2840, 2841, 2842, 2843, 2844, 2845, 2846, 2847, 2848, 2849, 2850, 2851, 2852, 2853, 2854, 2855, 2856, 2857, 2858, 2859, 2860, 2861, 2862, 2863, 2864, 2865, 2866, 2867, 2868, 2869, 2870, 2871, 2872, 2873, login2874, the encryption2875- can be disabled from the System dialog newed functions for plugins: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "safe" functions attempt to allocate memamory that is not cached to the Windows swap file) new functions for plugins: write_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if encrypting configuration files is enabled, "protected files" are gzipped and encrypted and saved nt's changes to AdvOR.dat a-en example plugin (C) that uses protected file operations was included ish.ln the source code archive - Notes.dll (a simple text editor which saves a text file to AdvOR.dat when encryption is enabled, and "AdvOR--notes.txt" when encryption is disabled) an example plugin (asm) that uses AdvTor_HandleRead() was included in the source code archive - ShowURL.dll (a plugin that shows the complete URLs used with HTTP proxy requests) new functions for specialugins: tor_gzip_compress(), tor_gzip_uncompress(), tor_zlib_new(), tor_zlib_process(), tor_zlib_free(), detect_compression_method() the plugin Blacklist.dll can now download and uncompress gzipp GUI effed blacklists (updadated languaage strings: 2777, 2778, 277 47, 53, 57, 59, 2780, 2781, 2782, 2783, 2784, 278560, 62, 127486, 2787, 2788, 2789, 27904, 2791, 2792, 2793, 2794, 279805, 281796, 2797, 2798)


    2011-05-19 19:25:53
    Updated by Magibon

    • Synopsis: Advanced Onion Router is a client for the anonymous TOR netwoork that that can anonymize applications anonymwize applications withoutthout thee need of a configured pured proxy y required by most most TOR OR cliients. AOR is inteOR is intended to be an improveroved alterternattive for the TOR+Vidalia+Privoxy bundle for Windows users, able to "force" a program and its plugins to use the TOR network.Additionally, the author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "TOR browser" using Opera.
    • What's new: New release of Advanced Onion Router - version 0.2.0.12.Changes: corrected: when an UNICODE language file was loaded, list view subitems for hidden services and plugins were not updated corrected: since language files were loaded using read_file_to_str(), language files were opened in text mode and had CRLF (\r\n) converted to LF (\n), which caused multi-line debug messages to be converted to single-line messages the restriction for minimum circuit bandwidth rate now uses BandwidthCapacity instead of BandwidthRate (it uses what the router is known to handle instead of what the router reported it can handle) the window title will show "Disconnected" when disconnecting from the OR network (suggested by TT) new option for circuit context menus on the "Network information" page: "Priority", which is used when deciding which circuits to use for a new client connection when more circuits with different priorities exist; low priority circuits are used only when no higher priority circuits are available new option for circuit context menus on the "Network information" page: "Availability" which can be used to change expiration times or to prevent a manually built circuit from expiring (the default expiration time can be changed from the "Circuit build" page) new option on the "System" page: "Encrypt all settings using AES"; if this option is enabled, all configuration files are gzipped and encrypted using a password or a key file and saved to AdvOR.dat, original configuration files are deleted; to revert the encryption and to save plain-text configuration files, after a successfull login, the encryption can be disabled from the System dialog new functions for plugins: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "safe" functions attempt to allocate memory that is not cached to the Windows swap file) new functions for plugins: write_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if encrypting configuration files is enabled, "protected files" are gzipped and encrypted and saved to AdvOR.dat an example plugin (C) that uses protected file operations was included in the source code archive - Notes.dll (a simple text editor which saves a text file to AdvOR.dat when encryption is enabled, and "AdvOR--notes.txt" when encryption is disabled) an example plugin (asm) that uses AdvTor_HandleRead() was included in the source code archive - ShowURL.dll (a plugin that shows the complete URLs used with HTTP proxy requests) nwew functions fore plugins:ot updator_gzip_ed comprrected: ss(),ince tor_langzip_uncage files were loaded using read_file_to_str(), language files were opened in text mprodess(), tor_zlib_newand had CRLF (),\r\n) converted tor_zlib_process LF (\n), tor_z, which caused multi-lib_frne debug message(),s to be convertedetect_c to single-line messages the restriction for minimump circuit bandwidth resate now uses BandwidthCapacity instead of Ban_methdwidthRate (it uses what the router is known to handle instead of what the router reported it can handle) the window title will show "Disconnected" when disconnecting from the OR netwodrk ()suggested by tTT) new option for circuit context menus on the "Network information" plugin Blage: "Priority", which is used when deciding which circkluist.dll can ns tow use for a new client connection when more circuits with different priorities exist; low priority circuits are used only when no higher priority circuits are available new option for circuit context menus on the "Network information" page: "Availability" which can be used to change expiration times or to prevent a manually built circuit from expiring (the default expiration time can be changed from the "Circuit build" page) new option on the "System" page: "Encrypt all settings using AES"; if this option is enabled, all configuration files are gzipped and encrypted using a password or a key file and saved to AdvOR.dat, original configuratiownlo files are deleted; to revert the aencryption and to save plain-text configuration files, after a successfull login, the encryption can be disabled from the System dialog new functions for plugins: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "safe" functions attempt to allocate memory that is not cached to the Wind unows swap file) new functions fomr plugins: wress ite_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if encrypting configuration files is enabled, "protected files" are gzippipped and encrypted and saved to AdvOR.dat an example plugin (C) that uses protected filed bl operations was included in the source code arckhive - Notes.dll (a simpliste text editor which saves a text file to AdvOR.dat when encryption is enabled, and "AdvOR--notes.txt" when encryption is disabled) an example plugin (asm) that uses AdvTor_HandleRead() was included in the source code archive - ShowURL.dll (a plugin that shows the complete URLs used with HTTP proxy requests) new functions u for pdalugins: tor_gzip_compress(), tor_gzip_uncompress(), tor_zlib_new(), tor_zlib_process(), tor_zlib_free(), detect_compression_method() the plugin Blacklist.dll can now download and uncompress gzipped blacklists updated language strings: 2777, 2778, 2779, 2780, 2781, 2782, 2783 2777, 2778, 2779, 2780, 2781, 2782, 272783, 2784, 2785, 2786, 2787, 2788, 275, 2786, 2787, 2788, 2789, 279, 2790, 2791, 27, 2792, 2793, 2794, 2793, 2794, 27955, 2796, , 27797, 2798


    2011-05-19 19:02:21
    Updated by Magibon

    • Version: V0.2.0.112
    • Synopsis: Advanced Onion Router is a client for the anonymous TOR network that can anonymize applications without the need of a configured proxy, as with most TOR clients. AOR is intended t required by most TOR clients. AOR is intended to be ae an improved alterternative for TOR+Vidaliaidalia+Privooxy bundundle for Windows users, able to "for Windows orce" a program and its plugins to use the TOR networs, k.Additionable "force" a programly, the and its plugins to use theor TOR netwoincludes infork.Additionally, the mauttion on horw to includses information on how to use AAdvOR w with the browsthe browser bundndle frome tofrom torprojeect.ororg (Firefox) and/o/or howow to make a e a portable "TOR brrowser" wusithng Opera.
    • Size (in bytes): 77981680190
    • Download URL: http://voxel.dl.ssourceforge.net/proe.net/projects/advtor/AadvOR-0.2tor/files/AdvOR-0.2.0.11/2/AdvOR-0.20.2.0.1.12.zip/download
    • What's new: New release of Advanced Onion Router - version 0.2.0.11-04-25 A.Changes: corrected: when an UNICODE language file was loaded, list view subitems for hidden services and plugins were not updated corrected: since language files were loaded using read_file_to_str(), language files were opened in text mode and had CRLF (\r\n) converted to LF (\n), which caused multi-line debug messages to be converted to single-line messages the restriction for minimum circuit bandwidth rate now uses BandwidthCapacity instead of BandwidthRate (it uses what the router is known to handle instead of what the router reported it can handle) the window title will show "Disconnected" when disconnecting from the OR network (suggested by TT) new option for circuit context menus on the "Network information" page: "Priority", which is used when deciding which circuits to use for a new client connection when more circuits with different priorities exist; low priority circuits are used only when no higher priority circuits are available new option for circuit context menus on the "Network information" page: "Availability" which can be used to change expiration times or to prevent a manually built circuit from expiring (the default expiration time can be changed from the "Circuit build" page) new option on the "System" page: "Encrypt all settings using AES"; if this option is enabled, all configuration files are gzipped and encrypted using a password or a key file and saved to AdvOR.dat, original configuration files are deleted; to revert the encryption and to save plain-text configuration files, after a successfull login, the encryption can be disabled from the System dialog new functions for plugins: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "safe" functions attempt to allocate memory that is not cached to the Windows swap file) new functions for plugins: write_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if encrypting configuration files is enabled, "protected files" are gzipped and encrypted and saved to AdvOR.dat an example plugin (C) that uses protected file operations was included in the source code archive - Notes.dll (a simple text editor which saves a text file to AdvOR.dat when encryption is enabled, and "AdvOR--notes.txt" when encryption is disabled) an example plugin (asm) thanct uses AdvTor_HandleRead() was included On ion Rthe source coutder 0.2.0.11- coarrected: hif an invalid hostname was requested, the connection state was not- ShowURL.dll (a plugin set (thanks to Rt shows the complete URLs usexd with HTTP fopr reportioxy requests) new functions for plugins: tor_gzip_compress(), tor_g thzip_uncompress(), tor_zlib_new(), tor_zlib_process(), etor_zlib_froree()- , dethe functi_con CreateNmprewProcess() returns a priocess handle for _methe process that was created- new configuration option: Synchronizd() theExit which can have QuickStart men plu gitems as parn Blameters, to start appcklications ant.d to wait for them to terminate, then exit, or tll can now exit when any dof the Sywnchrload anizeExitd apuncomplications exits, alsoress terminating all intercepted processes (for situations where AdvOR is only needzipped for one appbliacaklistion)-s added instructions on how to use the Tor Browser bundle from torproject.org with AdvOR and a sample AdvOR.ini to AdvOR\Tor-info\Firefox (readme.txt and AdvOR.ini).-ated added instructions o lan how to guse Opera as a portable "Torge Browsetr"ings: 2777, 2778, 2779, 2780, 2781, 2782, 2783, 2784, 2785, 2786, 2787, 2788, 2789, 2790, 2791, 2792, and2793, 2794, 2795, a sample AdvOR.ini to AdvOR\Tor-info\Opera (readme.txt and AdvOR.ini).See the Changelog.txt file for2796, 2797, older changelogs.2798


    2011-04-27 17:44:18
    Updated by webfork

    • Categories: [System - Network]
    • Synopsis: Advanced Onion Router is a client for the anonymous TOR network that can anonymize applications without the need of a configured proxy, as with most TOR clients. AOR is intended to be an improved alternative for TOR+Vidalia+Privoxy bundle for Windows users, able "force" a program and its plugins to use the TOR network.Additionally, the author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "TOR browser" with Opera.


    2011-04-26 14:22:15
    Updated by SYSTEM

    • License: Various Open Source
    • Synopsis: Advanced Onion Router is a client for OR network and is intended to be an improved alternative for The anonymous TOR network that can anonymize applications without the need of a configured proxy, as with most TOR clients. AOR is intended to be an improved alternative for TOR+Vidalia+Privoxy bundle for Windows users. It is able to "force" a program and its plugins to use the Tor proxy regindows users, ardbless of its c"fonfigurced" a proxy.Addgram and its plugitionalns to use the TOR network.Additionally, the author wa the author includes kind enougformation on how to include detailed information on how to use Adse AdvOR with thOR with the browser bunndle frome tofrpom torproject.org (Firefox) and/or how tor how to make a e a portaable "TOR ble "tor brrowser" with Opera.


    2011-04-26 06:42:09
    Updated by webfork

    • License: Various
    • Download URL: http://voxel.dl.sourrcefoorge.e.net/et/projectst/advdvtor/AdvOR-0.2.0.11/AdvOR-0.2.0.11.zip


    2011-04-26 06:40:13
    Updated by webfork

    • Categories: [System - Network] [Internet - Proxy Servers]
    • Version: V0.2.0.911
    • License: Various Open Source
    • System Requirement: Vista Win7
    • Synopsis: Advanced Onion Router (is a client for OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. It is able to "force" a program and its plugins to use the Tor proxy regardless of its configured proxy.Additionally, the author was kind enough to include detailed informerly Advation onc how to used TAdvOR) enabl with the browser anonymobus connections quickly and leasily from torproject.org applications with or without pro(Firefoxy support usually necess) ary for the TOR network. AdvOR includes/or how to make long list of othera portable "tools and featurer brows for the TOR network" wincluding bethaving as a serv Oper and blocking outgoing connections, ports, and websites.
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally -- especially for those running the program from flash memory -- go to the "System" menu in options and check "Try to write to disk less frequently".
    • Size (in bytes): 77516590190
    • Screenshot: Updated
    • Stealth: No Yes
    • Suggested by: LVegctobasr
    • What's new: 2011-04-02 Advanced Onion Router 0.2.0.9 corrected: AdvOR.dll was checking for the old signature "AdvTor" instead of "AdvOR" when releasing intercepted processes corrected: the options to avoid using in same circuit nodes from same subnets and countries are no longer disabled when enabling the option to avoid AS path intersections the code was restructured to get rid of all goto's inherited from Tor; some functions were optimized and some memory le5 Advaks were corrected direnctory servers runningd AdvOnion R no longer accept requests for "/tor/bytes.txt", "/tor/mallinfoouter 0.2.0.txt" and11- "/tcor/dbg-stabilirecty.txt" ; requests for them will result in 404 errors new configuationed: option: Coif anfirmations; currently it is used to configure confvalird hostnamation dialoge was that arequested, shown at exit and when closnnecting non-proxy connections of an intercepted process when changing the identity, more information is shown about the new identity when possible the option "Circuit timeout when exiting program" was moved from the Circuit Build page to the "Become a Server" page as "Circuit timeout when entering hibernation"; this made room for a new option, new configuration option: CircuitBandwidthRate (default is disabled), which is ustate was not sed to configure the minimum required bandwidth rate fort circui(thanks nto RoLewx foptionr on thre Ciporcuit Buildng this page:rror)- the "Minimum circfuit bandwctidthon Create"; iNewProcess() returns a process handle f thior the process that was o created- new configuration option is enabled, on: SynchronizeExit which can have QuickStall circuits will be built with romenu iterms that haves the minimuparameters, to start applications and to wait for them to term inate, then exit, orequ to exired bt when any of the SynchronizeExit applications exits, also terminating all intercepted processes (for situations where AdvOR is only needed for one application)- added instructions on how to use the Tor Browser bundle from torproject.org width rate upAdavOR and a sample AdvOR.ini to AdvOR\Tor-info\Firefox (readme.txt and AdvOR.ini).- added la instructions ong how to uage strings:se Opera as a portable "Tor 123, 2690, 2767,Browser" and a sample AdvOR.ini 2768,to AdvOR\Tor-info\Opera 2769, 2770, 2771,(readme.txt 2772, 2773, 2774,and 2775, 2776AdvOR.ini).See the Changelog.txt file for older changelogs.


    2011-04-25 21:35:00
    Updated by webfork

    • License: Various Open Source
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally (for those u-- especially for those running the program from flash memory), -- go to the "System" menu in options and check "Try to write to disk less frequently"


    2011-04-14 20:06:47
    Updated by webfork

    • Software title: Advanced TOnion Router
    • Version: V0.12.0.139
    • License: Various Open Source
    • Synopsis: Advanced Onion Router (formerly Advanced TOR) enables anonymoules coanonymous connections quickly and easily for uickly and easily for apppliications with oth or without proxy supy support usually nly necessary for the TOR network. AdvTorOR includes a long list of other tools and features for the TOR network including behaving as a server and blocking outgoing connections, ports, and websites.
    • How to extract: Download the binary ZIP package and e and extract to a foldeder o of youur choicce. Launch AdvTorOR.exe.Optionally (for those using flash memory), go to the "System" menu in options and check "Try to write to disk less frequently"
    • Size (in bytes): 775169800051
    • What's new: What's new in Advanced TOR 0.1.0.12:November 17th, 2010· corrected: if the option to start Tor automatically was enabled, the state of "Start Tor" button was not set to BST_CHECKED (thanks to mamont for reporting this error)· corrected: the option "Start Tor" from system tray menu did not set the state of "Start Tor" button to BST_CHECKED· corrected: when showing opened ports in hidden service selection dialog, the function ShowOpenPorts() did not use the buffer it re-allocated· the procedures that handle operations for connection tree items no longer use stored pointers related to last selected item· when changing identity, all existing connections of types OR, AP and EXIT are marked for close· the constant MAX_UNUSED_OPEN_CIRCUITS is now a configuration variable MaxUnusedOpenCircuits (default is 12)· the configuration variable DisablePredictedCircuits was removed; a value of 0 for MaxUnusedOpenCircuits means that predicted circuits are disabled· the option "Ports for services that have long2011-running connections" was moved from "Circuit build" to "Connections"· new option on "Circuit build" page: "Maximum number of unused predicted open circuits"· new bootstrap status: BOOTSTRAP_STATUS_STARTED; if MaxUnusedOpenCircuits is 0, starting Tor will set bootstrap status to 100% because no predicted circuits need to be created· added: new option "Stop Tor" available on system tray menus when Tor is started· updated language strings: 2669, 2670, 2671What's new in Advanced TOR 0.1.0.11:November 17th, 2010·4-02 corrected: the function add_all_streams() did not initialize the buffer it allocated for the string added to connection tree on Network Information page· the button "Start Tor" is no longer disabled after starting Tor, it is now a checkbox; stopping Tor means entering hibernation mode (requested by cc)· if an .onion address is specified, AdvTor will search existing hidden services for its private key (requested by cc)· if no private key for an entered .onion address is found, AAdvTor will prompt the user to enter one (requested by canc)· updated language str Oniongs: 2664, 2665, 2666, 2667, 2668What's new in Advanced TOR 0.1.0.10:November 13th, 2010· corrected: if acting on one of config options failed, all remaining options were· ignored· added: new option to dump statistics to debug/log available in context menus· added: new page "Network information" which contains information about· circuits, processes that have their traffic redirected to O R network and bandwidth· usage· added: new circuit builder dialog which allows building a circuit by specifying all· nodes and/or to estimater 0.2.0.9 a new gocorrected circuit p: AdvOR.dll waths chavecking specified lengor th· updatee old lasigngatuagre str"AdvTor" ingsWhat's new inad of "AdvOR" when releasing intercepted TOR 0.1.0.9c:November 13th, 2010· the function rend_client_get_rprocesses corrected: the options to avoid using in sandom_intro() could had selected a banned router as introde circuction point to a hidden service· the funcition onion_pick_cpath_exit() will no longer warn but fail if ades from requested ame subnexit router if found ins band countries are no longer disablist· ted when enabling the oprtion to avoid AS path intersections the ceode was restructurred to ge t rid of all goto's inherited from Tor; some functions were optimized and some memory leaks were corrected directory servers running AdvOR no longer accleapt requests for "/tor/bytes.txt", "/tor/malling thefo.txt" and "/tor/debubg edi-st window wability.txt" ; requests for them will result in 404 errors new configuation option: Confirmations; currently it is used to configure confirmation dial alsogs that are send EM_SETHANDLEhown at exit and when needed, ton closing non-preventoxy drawing UNICODE \0 oconnections of an intercepted process when changing the identity, more information is shown about the new identity when possible the option "Circuit timeout when exiting program" was moved from the sysCircuitems Build page to the "Become a Server" page as "Circuit timeout when entering hibernation"; this made room for a new option, new configuration option: CircuitBandwidthRate (defaulte is distabled wi), which is used to configure the minimum required bandwidth rate for circuits new option on the Circuit Build page: "Minimum circuit bandwidth rate"; if th Wis option is enabledow, all circuits XP SP will be built with routers that have the minimum required bandwidth rate updated language strings: 123, 2690, 2767, 2768, 2769, 2770, 2771, 2772, 2773, 2774, 2775, 2)776See the Changelog.txt file for older changelogs.


    2010-11-19 21:02:12
    Added by webfork