Change history for Advanced Onion Router


2017-11-05 19:22:58
Updated by billon

  • Version: v0.3.1.4 5
  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. . The program attempts to circumvent firewalls, website censorship, web tracking tools, and more. . Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR AdvOR is able to "force" a program to use the [url=http https://tor.eff.org/]Tor[/url] network. Note that the Tor site recommends [url=https://www.torproject.org/download/download-easy.html.en]against[/url] using the service for Torrent connections. [b]Note:[/ [/b] ]: Instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.
  • Download URL: http://www.te-home.net/?do=work&id=advor&file=162 164&action=get
  • Keywords: advor advtor onionrouter advancedonionrouter advancedonion advanced%20onion%20router onionrouter
  • Release date: 2017-06-11-05
  • What's new: Updated: [list] [*][font=monospace]geoip_c.h[/font] with [i]GeoIPCountryWhois.csv[/i] released on June October 7 4'th; there are 153678 163953 IP ranges having 32 ranges in the fake "A1" country; 31 all 32 ranges were approximated to real countries. [*]The OpenSSL library to 1.1.0f. [/ 0g. [*]Directory authorities according to [url]https://atlas.torproject.org/#search/flag:Authority[/url]. [/list]


2017-06-11 16:44:39
Updated by billon

  • What's new: Updated: [list] [*][font=monospace]geoip_c.h[/font] with [i]GeoIPCountryWhois.csv[/i] released on June 7'th; there are 153678 IP ranges having 32 ranges in the fake "A1" country; 31 ranges were approximated to real countries. [*]The OpenSSL library to 1.1.0f. [/list]


2017-06-11 16:43:47
Updated by billon

  • Website URL: https http://sourceforge www.te-home.net/projects/advtor/ /?do=work&id=advor
  • Version: v0.3.1.3 4
  • Download URL: https http://sourceforge www.net/projects/advtor/files/AdvOR te-0 home.3.1.3/AdvOR-0.3.1.3.zip/download net/?do=work&id=advor&file=162&action=get
  • Release date: 2017-05 06-14 11
  • What's new: [ Updated: [list] [*]When a client uses an unrecognized Socks5 login, the request ] [*][font=monospace]geoip_c.h[/font] with [i]GeoIPCountryWhois.csv[/i] released will on be June allowed 7'th; however, a there warning are will 153678 be IP shown ranges that having contains 32 the ranges username and in the password fake "A1" country; 31 to ranges allow were users approximated to find real bad configuration settings (this solves the problem with replacing Tor with AdvOR in the Tor Browser Bundle). [*] countries. [*]The files [i]Help\Firefox\readme.txt[/i] and [i]Help\Firefox\AdvOR.ini[/i] were OpenSSL updated library to work with the 6 1.5 1.2 version of Tor Browser. [*]Updated language strings: 3262, 3263 0f. [/list]


2017-05-15 06:57:47
Updated by billon

  • Version: v0.3.1.2 3
  • Download URL: https://sourceforge.net/projects/advtor/files/latest AdvOR-0.3.1.3/AdvOR-0.3.1.3.zip/download
  • Release date: 2017-05-05 14
  • What's new: [list] [*]Corrected When some a plugin client calls uses that an were unrecognized using Socks5 different login, the calling request conventions will than be expected allowed; however, a when warning compiled will with be newest shown versions that of gcc. [*]Added a splitter between contains the main tree username and the configuration password page to that allow can be used users to resize find the bad configuration page. [*]If settings (this both [font=monospace]WindowPos[/font] and [font=monospace]GuiPlacement3[/font] are solves found, [font=monospace]GuiPlacement3[/font] is the used problem because with it replacing stores Tor splitter's with position ([font=monospace]WindowPos[/font] will still be saved to [i]AdvOR.ini[/i]). [*]Messages that are logged before in the GUI Tor is Browser created Bundle). [*]The are cached and shown later in the Debug window. [*][font=monospace files [i]geoip_c Help\Firefox\readme.h txt[/font i] was updated with and [i]GeoIPCountryWhois Help\Firefox\AdvOR.csv ini[/i] released were on updated May to 2nd; there work are 153441 IP ranges having 32 ranges in with the fake "A1" country; 31 6.5.2 ranges version were of approximated Tor to Browser. [*]Updated real language countries strings: 3262, 3263. [/list]


2017-05-06 04:10:31
Updated by billon

  • Version: v0.3.1.1 2
  • Release date: 2017-04 05-27 05
  • What's new: [list] [*]Added Corrected support some for plugin Unicode calls command that line were arguments; [font=monospace]main()[/font] will using use [font=monospace]argv[][/font] arguments different converted calling from conventions Unicode than to expected UTF-8 when compiled with newest versions of gcc. [*]Corrected Added some a memory splitter allocation between problems the main tree and the configuration page that could can had be caused used deallocation to of resize invalid the memory configuration regions page. [*]The If procedure both [font=monospace]WindowPos[/font] and [font=monospace]GuiPlacement3[/font] are that found, [font=monospace]GuiPlacement3[/font] is searches used the because memory it allocated stores for splitter's position ([font=monospace]WindowPos[/font] will still be saved to [i]xul AdvOR.dll ini[/i] for ]). [*]Messages a that function are that logged can before be the called GUI to is delete created cookies are from cached Firefox and when shown changing later in the identity Debug window. [*][font=monospace]geoip_c.h[/font] was removed. [*]Starting updated with [i]GeoIPCountryWhois.csv[/i] released this on version, configuration May options 2nd; there used are by 153441 both IP 0.3x ranges and having 0.4x 32 versions ranges of in AdvOR the will fake "A1" country; 31 be ranges saved were approximated to [i]AdvOR.ini[/i]. [/ real countries. [/list]


2017-04-28 09:47:19
Updated by billon

  • Version: v0.3.1.0 1
  • Release date: 2017-04-11 27
  • What's new: [list] [*]DirServers Added was support renamed for to Unicode DirAuthorities, to command update line the arguments; [font=monospace]main()[/font] will list use [font=monospace]argv[][/font] arguments of converted directory from authorities Unicode in to older UTF-8. [*]Corrected AdvOR.ini some files. [*]as2asm memory can allocation now problems handle that files could larger had than caused 73 deallocation MB. [*]Updated: [list] [*]Lbraries: libevent-2.1.8-stable, openssl-1.1.0e, zlib-1.2.1; [*]The of AS invalid path memory tree regions. [*]The with procedure latest that AS searches path the definitions memory from allocated cidr-report for [i]xul.org; there dll[/i] for are a 281211 function AS that path can definitions; [*]csv2asm be with called latest to AS delete path cookies definitions; [*]geoip_c.h from with Firefox GeoIPCountryWhois.csv when released changing on the April identity 6th; there was are removed. [*]Starting 151790 with IP this ranges version, configuration having options 33 used ranges by in both the 0.3x fake "A1" country; 32 and ranges 0.4x were versions approximated of to AdvOR real will countries; [*]Language be strings: 491, 531, 657. [/list] [/ saved to [i]AdvOR.ini[/i]. [/list]


2017-04-11 19:53:39
Updated by billon

  • What's new: [list] [*]DirServers was renamed to DirAuthorities, to update the list of directory authorities in older AdvOR.ini files. [*]as2asm can now handle files larger than 73 MB. [*]Updated: [list] [*]Lbraries: libevent-2.1.8-stable, openssl-1.1.0e, zlib-1.2.1; [*]The AS path tree with latest AS path definitions from cidr-report.org; there are 281211 AS path definitions; [*]csv2asm with latest AS path definitions; [*]geoip_c.h with GeoIPCountryWhois.csv released on April 6th; there are 151790 IP ranges having 33 ranges in the fake "A1" country; 32 ranges were approximated to real countries; [*]anguage Language strings: 491, 531, 657. [/link list] [/list]


2017-04-11 19:51:59
Updated by billon

  • Website URL: http https://www.te-home sourceforge.net/?do=work&id=advor /projects/advtor/
  • Version: v0.3.0 1.27 0
  • License: [url=http https://sourceforge.net/projects/advtor/develop]Various Open Source[/url]
  • Download URL: http https://www.te-home sourceforge.net/?do=work&id=advor /projects/advtor/files/latest/download
  • Release date: 2017-02 04-12 11
  • What's new: Updated: [ [list] [*]The DirServers OpenSSL was library renamed to 1 DirAuthorities, to update the list of directory authorities in older AdvOR.0.2k ini files. [*]The as2asm zLib can library now to handle files larger than 73 MB. [*]Updated: [list] [*]Lbraries: libevent-2.1.8-stable, openssl-1.1.0e, zlib-1.2.11. [*][i] 1; [*]The AS path tree with latest AS path definitions from cidr-report.org; there are 281211 AS path definitions; [*]csv2asm with latest AS path definitions; [*]geoip_c.h[/i] with [i] GeoIPCountryWhois.csv[/i] released on February April 7'th 6th; there are 150033 151790 IP ranges having 32 33 ranges in the fake "A1" country; all 32 ranges were approximated to real countries; [*]anguage strings: 491, 531, 657. [/link] [/list]


2017-02-12 20:50:51
Updated by billon

  • Size (in bytes): 10681657 10982664
  • Icon: Updated


2017-02-12 20:39:50
Updated by billon

  • What's new: Updated: [list] [*]The OpenSSL library to 1.0.2k. [*]The zLib library to 1.2.11. [*][i]geoip_c.h[/i] was updated with [i]GeoIPCountryWhois.csv[/i] released on February 7'th; there are 150033 IP ranges having 32 ranges in the fake "A1" country; all 32 ranges were approximated to real countries. [/list]


2017-02-12 20:39:12
Updated by billon

  • Version: v0.3.0.26 27
  • Release date: 2016 2017-11 02-06 12
  • What's new: [ Updated: [list] [*][ ] [*]The OpenSSL library to 1.0.2k. [*]The zLib library to 1.2.11. [*][i]geoip_c.h[/i] was updated with [i]GeoIPCountryWhois.csv[/i] released on October February 31 7'st th; there are 146784 150033 IP ranges having 31 32 ranges in the fake "A1" country; all 31 32 ranges were approximated to real countries. [*]Updated directory authorities according to [url]https://atlas.torproject.org/#search/flag:Authority[/url]. [/ . [/list]


2016-11-06 18:08:26
Updated by billon

  • Similar/alternative apps: [url=http https://www.portablefreeware.com/index.php?id=1088]PortableTor[/url]


2016-11-06 18:07:10
Updated by billon

  • Version: v0.3.0.25 26
  • Release date: 2016-10 11-14 06
  • What's new: [list] [*]The OpenSSL library was updated to openssl-1.0.2j. [*] ] [*][i]geoip_c.h [/i] was updated with [i]GeoIPCountryWhois.csv [/i] released on October 4 31'th st; there are 145708 146784 IP ranges having 31 ranges in the fake "A1" country; all 31 ranges were approximated to real countries. [*]Updated directory authorities according to [url]https://atlas.torproject.org/#search/flag:Authority[/url]. [/list]


2016-10-14 14:04:25
Updated by billon

  • What's new: [list] [*]he The OpenSSL library was updated to openssl-1.0.2j. [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October 4'th; there are 145708 IP ranges having 31 ranges in the fake "A1" country; all 31 ranges were approximated to real countries [/list]


2016-10-14 14:03:35
Updated by billon

  • Version: v0.3.0.24 25
  • Release date: 2016-06 10-12 14
  • What's new: [list] [*]he OpenSSL library was updated to openssl-1.0.2j. [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on June October 7 4'th; there are 123310 145708 IP ranges having 94 31 ranges in the fake "A1" country; 91 all 31 ranges were approximated to real countries. [/ [/list]


2016-06-12 23:17:21
Updated by billon

  • Version: v0.3.0.23 24
  • Size (in bytes): 10656843 10681657
  • Release date: 2016-05 06-14 12
  • What's new: [list] [*]The OpenSSL library was updated to openssl-1.0.2h. [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on May June 3 7'rd th; there are 121733 123310 IP ranges having 94 ranges in the fake "A1" country; 91 ranges were approximated to real countries. [/list]


2016-05-14 15:57:53
Updated by billon

  • Size (in bytes): 10636585 10656843


2016-05-14 15:55:33
Updated by billon

  • Version: v0.3.0.22 23
  • Download URL: http://www.te-home.net/?do=work&id=advor&file=108
  • Release date: 2016-04 05-12 14
  • What's new: [list] [*]The OpenSSL library was updated to openssl-1.0.2h. [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on April May 5 3'th rd; there are 120651 121733 IP ranges having 94 ranges in the fake "A1" country; 91 ranges were approximated to real countries. [/list]


2016-04-12 17:33:08
Updated by billon

  • Version: v0.3.0.21 22
  • Size (in bytes): 10612282 10636585
  • Download URL: http://www.te-home.net/?do=work&id=advor&file=98 108
  • Release date: 2016-03 04-10 12
  • What's new: [list] [*]The OpenSSL library was updated to openssl-1.0.2g. [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on March April 2nd 5'th; there are 119072 120651 IP ranges having 92 94 ranges in the fake "A1" country; 89 91 ranges were approximated to real countries. [*]Updated directory authorities. [/list]


2016-03-19 22:00:54
Updated by billon

  • Website URL: http://sourceforge www.te-home.net/projects/advtor/ /?do=work&id=advor
  • Version: v0.3.0.20 21
  • System Requirement:
  • Size (in bytes): 10097851 10612282
  • Download URL: http://sourceforge www.te-home.net/projects/advtor/files/ /?do=work&id=advor&file=98
  • Release date: 0000 2016-00 03-00 10
  • What's new: 2014-04-17 Advanced Onion Router 0.3.0.20[list] [*]corrected: the subdomain was not removed from an .onion address when searching for its rendezvous descriptor (thanks to AyrA for reporting this problem on sf.net) [*]the The OpenSSL library was updated to openssl-1.0.1g [*] 2g. [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on April March 2nd; there are 93477 119072 IP ranges having 102 92 ranges in the fake "A1" country; 98 89 ranges were approximated to real countries [/list] 2013-12-10 Advanced Onion Router 0.3.0.19a [list] [*]corrected: possible buffer overflow when setting a huge OS version string [*]corrected: when changing the default OS version, a buffer that was not allocated with tor_malloc() was freed with tor_free() (thanks to anonymous for reporting this problem on sf.net) [*]corrected: a generated AS path included some extra nodes that were before the selected path in the AS tree from geoip_as.h [*]the program that imports AS path definitions and generates the geoip_as.h file is now included in the source code archive (as2asm) [*]the AS path tree was updated with latest AS path definitions from cidr-report.org; a few errors were corrected in the AS tree import algorithm [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on December 5th; there are 84715 IP ranges having 114 ranges in the fake "A1" country; 110 ranges were approximated to real countries [*]updated . [*]Updated language directory strings: 1248 [/ authorities. [/list]


2014-11-30 03:05:27
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. The program attempts to circumvent firewalls, website censorship, web tracking tools, and more. Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network. Note that the Tor site recommends [url=https://www.torproject.org/download/download-easy.html.en]against[/url] using the service for Torrent connections. [b]Note:[/b] Instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2014-06-11 12:25:44
Updated by Midas

  • Forum topic ID: 6816 9102


2014-04-20 06:01:37
Updated by SYSTEM

  • Version: v0.3.0.19 20
  • Size (in bytes): 9384058 10097851
  • What's new: 2014-04-17 Advanced Onion Router 0.3.0.20 [list] [*]corrected: possible the buffer subdomain overflow was when not deleting removed Flash from player's an .onion history address from when a searching truncated .sol for file its rendezvous descriptor (thanks to anonymous AyrA for reporting this problem on sf.net) [*]corrected: when updating address maps using the "Associate addresses" dialog, the displayed exit OpenSSL node library was changed updated to "new exit" [*]corrected: the number of downloaded bytes openssl-1.0.1g [*]geoip_c.h was not updated shown with by GeoIPCountryWhois.csv the released Blacklist on plugin April unless 2nd; there a are language 93477 file IP was ranges loaded [*]corrected: when having an 102 application ranges sent in a the Socks5 fake "A1" country; 98 connection ranges request were followed approximated by to an real HTTP countries [/list] 2013-12-10 request Advanced without Onion waiting Router for 0.3.0.19a [list] [*]corrected: possible connection buffer status overflow for when the setting Socks5 a request, the huge Socks5 OS connection version status string [*]corrected: when was prepended to changing the HTTP default reply; this OS error version, a prevented buffer some that programs was from not using Socks5 allocated with AdvOR, like tor_malloc() was the freed Tor with Browser Bundle from torproject.org ( tor_free() (thanks to anonymous for reporting this error problem on sf.net) [*]corrected: the a circuit generated build AS dialog path could included had been used to build a circuit with some no extra nodes (thanks to that anonymous were for reporting this problem on sf.net) [*]updates from before the "Associate addresses" dialog selected are path scheduled instead of updating address maps while in the user AS changes tree them (thanks from to anonymous for reporting this problem on sf geoip_as.net) [*] h [*]the function program escaped() was that replaced imports by AS esc_for_log() to path solve some possible non-reentrancy problems definitions and memory leaks caused by it [*]added instructions for using generates the Dooble browser with AdvOR, a sample configuration geoip_as.h file and is a now patch included that in prevents the it source from code downloading scripts from Google to AdvOR\Help\Dooble archive (readme.txt, AdvOR.ini as2asm) [*]the and AS patch-dooble.*). [*]the path Blacklist tree plugin was now updated has with an latest URL AS for path the "Primary threats" blacklist definitions from iblocklist cidr-report.com (it org; a can few be errors selected were from corrected in the URL AS history tree combo import box) [*]updated libraries: libevent-2.0.21-stable, openssl-1.0.1e, zlib-1.2.8, libntlm-1.4 algorithm [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on November December 5th; there are 86068 84715 IP ranges having 102 114 ranges in the fake "A1" country; 102 110 ranges were approximated to real countries [*]updated language strings: 1248 [/list]


2014-03-15 00:14:25
Updated by Checker

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. The program attempts to circumvent firewalls, website censorship, web tracking tools, and more. Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network. . [b]Note: instructions :[/b] Instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2013-12-08 07:06:57
Updated by SYSTEM

  • Version: v0.3.0.18b 19
  • Size (in bytes): 10161706 9384058
  • What's new: 2013-04-23 Advanced Onion Router 0.3.0.18b[list] [*]corrected: the possible variable buffer IdentityAutoChange overflow was when initialized deleting with Flash player's history from a wrong truncated .sol value file (thanks to anonymous for reporting this error problem on sf.net) [/list] 2013-04-22 Advanced Onion Router 0.3.0.18a [list] [*] ) [*]corrected: a when duplicate updating variable address name "iplist" (a maps pointer using in the "Associate dlg_bypassbl.c addresses" dialog, the and displayed an exit array node in was routerlist.c) caused a pointer changed to "new be overwritten with exit" [*]corrected: the first number IP of address downloaded that bytes was not shown in by the "Select IP" system Blacklist tray plugin menu (thanks unless to a anonymous language for file reporting was this error on sf.net) [/list] 2013-04-20 Advanced Onion Router 0.3.0.18 [list] [*] loaded [*]corrected: when updating an some application settings sent from the "Private identity" page with new language strings, a program Socks5 restart connection was request needed [*]new followed option by on an the "Bypass HTTP Tor request blacklists" page: "Save without node waiting statistics for to connection exclude status nodes that were restarted and have for the same Socks5 IP"; request, the list Socks5 of connection IPs status of was exit nodes can be saved prepended to a the file HTTP to reply; this better error estimate prevented their some longevity programs at from a using later time, for detecting new nodes Socks5 with a better accuracy (ExitSeenFlags) [*]new option on AdvOR, like the "Bypass Tor blacklists" page: "Assume Browser blacklists Bundle remove from IPs torproject.org (thanks that to were not seen anonymous for [time_interval]"; IPs of reporting nodes this that error were on no sf.net) [*]corrected: the longer circuit seen build for dialog a could long had period been of time can be automatically removed from AdvOR-iplist.dat used to allow build re-using a IPs circuit with websites no that use blacklists that remove old entries nodes (ExitMaxSeen) [*]the "Hidden services" configuration page now has checkboxes near all configured hidden services thanks to allow anonymous enabling/disabling for them reporting during this AdvOR runtime (requested by anonymous problem on sf.net); all ) [*]updates checkboxes from are the "Associate enabled addresses" dialog by are default scheduled and instead their of state updating is address not maps saved while to the AdvOR.ini [*]updated user language changes strings: 3260, 3261 [/list] 2013-04-05 Advanced Onion Router 0.3.0.17 [list] [*]corrected: possible buffer overflow in GetConnInfo() ( them (thanks to anonymous for reporting this error problem on sf.net) [*]the procedure function initmemunits escaped() was moved replaced from dlg_connections.c by esc_for_log() to dlg_util.c [*]new solve configuration some option: IdentityAutoChange [*]new possible option non-reentrancy on problems the "Private and identity" page: "Show memory a leaks completion caused MessageBox"; this by option it [*]added can instructions be for used to disable using the message Dooble box browser shown with when AdvOR, a the sample identity configuration is file changed (IdentityFlags) [*]new and option a on patch the "Private that identity" page: "Every [time_interval] change prevents my it IP|identity"; this from option downloading can scripts be from used Google to automatically AdvOR\Help\Dooble (readme.txt, AdvOR.ini change and patch-dooble.*). [*]the exit Blacklist IP plugin or now the has identity an at URL a for specified the "Primary time threats" blacklist interval from iblocklist.com (IdentityFlags, IdentityAutoChange); when it this can option is enabled, next IP is be selected according to from the configured URL exit history selection combo algorithm (details box) [*]updated in the help file) [*] libraries: libevent-2.0.21-stable, openssl-1.0.1e, zlib-1.2.8, libntlm-1.4 [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on April November 2nd 5th; there are 169256 86068 IP ranges having 455 102 ranges in the fake "A1" country; 451 102 ranges were approximated to real countries [*]updated language strings: 3247, 3248, 3249, 3250, 3251, 3252, 3253, 3254, 3255, 3256, 3257, 3258, 3259 [/list] 2013-03-20 Advanced Onion Router 0.3.0.16c [list] [*]corrected: if server mode was disabled while AdvOR was in hibernation mode, when reconnecting to the OR network the server identity key remained set while server mode was disabled, triggering an assert in get_server_identity_key() (thanks to anonymous for reporting this problem on sf.net) [/list] 2013-03-19 Advanced Onion Router 0.3.0.16b [list] [*]corrected: when changing server mode settings, dns_launch_correctness_checks() could had been called before configuring the name servers (thanks to anonymous for reporting this problem on sf.net) [/list] 2013-03-18 Advanced Onion Router 0.3.0.16a [list] [*]corrected: the "Hidden Services" page was initialized with the resource identifier of another page (thanks to anonymous for reporting this problem on sf.net) [*]the AdvOR.ini sample for Firefox was updated to work with the latest "Tor Browser" package from torproject.org [/list]


2013-05-05 11:57:14
Updated by SYSTEM

  • Version: v0.3.0.16 18b
  • Size (in bytes): 10197941 10161706
  • What's new: 2013-04-23 Advanced Onion Router 0.3.0.18b [list] [*]corrected: the list with directory variable authorities IdentityAutoChange was initialized with values from a read-only wrong location value (thanks to anonymous for reporting this error on sf.net) [*] ) [/list] 2013-04-22 Advanced Onion Router 0.3.0.18a [list] [*]corrected: address a map duplicate association variable updates name "iplist" (a required pointer in dlg_bypassbl.c and an array in routerlist.c) caused a program pointer restart to be overwritten with the first IP address that was shown in the "Select IP" system tray menu (thanks to anonymous for reporting this problem error on sf.net) [*] ) [/list] 2013-04-20 Advanced Onion Router 0.3.0.18 [list] [*]corrected: when re-connecting updating to some settings from the "Private OR identity" page network, listeners with were new sometimes language delayed strings, causing a ports program to restart stay was closed needed [*]new for option up on to the "Bypass 60 Tor seconds [*]corrected: the blacklists" page: "Save procedures node statistics to exclude nodes that disconnect were AdvOR restarted from and have the OR same network IP"; the are list now of scheduled (thanks IPs of exit nodes can be saved to anonymous a file to better estimate their longevity at a later time, for reporting detecting this new problem nodes on with sf.net) [*]the a procedures better related accuracy (ExitSeenFlags) [*]new to option on the "Associated Bypass addresses Tor blacklists" page: "Assume blacklists remove IPs that were moved not to seen for [time_interval]"; IPs of nodes that were no longer seen for a separate long file, dlg_addrmaps.c [*]added period the of option time to can use be browser's automatically original removed User from AdvOR-Agent iplist.dat string; the to option allow is re-using available IPs on with websites that use blacklists that remove old entries (ExitMaxSeen) [*]the "HTTP Hidden headers services" configuration page as "Don't now anonymize has browser checkboxes type" ( near all configured hidden services to allow enabling/disabling them during AdvOR runtime (requested by anonymous on sf.net) [*]new ); all option checkboxes on are the enabled exit by selection default dialog: "Use and only their recent state exits is that not are saved probably to not AdvOR.ini [*]updated blacklisted language yet" (requested strings: 3260, 3261 [/list] 2013-04-05 by Advanced Onion Router 0.3.0.17 [list] [*]corrected: possible buffer overflow in GetConnInfo() (thanks to anonymous for reporting this error on sf.net); this ) [*]the procedure initmemunits() was moved from dlg_connections.c to dlg_util.c [*]new configuration option: IdentityAutoChange [*]new sets option on the "Private identity" page: "Show a filter completion for MessageBox"; this recent option nodes can that be are used not to in disable blacklists the that message were box not shown updated when recently [*] the identity is changed (IdentityFlags) [*]new option on the "Private identity" page: "Bypass Every [time_interval] change Tor my blacklists" with IP|identity"; this options option can be related used to bypassing automatically bans change on the websites exit that IP use or blacklists the identity at a specified time interval (IdentityFlags, IdentityAutoChange); when this option is enabled, next IP is selected according to ban the Tor configured and exit other selection proxies algorithm (dlg_bypassbl.c details in the help file) [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on March April 3rd 2nd; there are 179875 169256 IP ranges having 375 455 ranges in the fake "A1" country; 372 451 ranges were approximated to real countries [*]updated language strings: 3235 3247, 3236 3248, 3237 3249, 3238 3250, 3239 3251, 3240 3252, 3241 3253, 3242 3254, 3243 3255, 3244 3256, 3245 3257, 3246 3258, 3259 [/list] 2013-03-20 Advanced Onion Router 0.3.0.16c [list] [*]corrected: if server mode was disabled while AdvOR was in hibernation mode, when reconnecting to the OR network the server identity key remained set while server mode was disabled, triggering an assert in get_server_identity_key() (thanks to anonymous for reporting this problem on sf.net) [/list] 2013-03-19 Advanced Onion Router 0.3.0.16b [list] [*]corrected: when changing server mode settings, dns_launch_correctness_checks() could had been called before configuring the name servers (thanks to anonymous for reporting this problem on sf.net) [/list] 2013-03-18 Advanced Onion Router 0.3.0.16a [list] [*]corrected: the "Hidden Services" page was initialized with the resource identifier of another page (thanks to anonymous for reporting this problem on sf.net) [*]the AdvOR.ini sample for Firefox was updated to work with the latest "Tor Browser" package from torproject.org [/list]


2013-03-16 19:08:21
Updated by SYSTEM

  • Version: v0.3.0.15 16
  • Size (in bytes): 9519585 10197941
  • What's new: [list] [*]corrected: if the no list hibernation with interval directory is authorities set, hibernation was state initialized is with no values longer from changed a read-only location (thanks to anonymous for reporting this error on sf.net) [*]corrected: init_keys() could address had map been association called updates twice, when required the a OR port number was program changed restart (thanks to anonymous for reporting this error problem on sf.net) [*]corrected: fast when hibernation re-connecting state to changes the could OR had network, listeners caused were the sometimes main delayed, causing thread ports to be stay created twice (thanks to anonymous closed for reporting up this to error 60 on sf.net) [*] seconds [*]corrected: the a memory leak in parse_request_headers() [*]corrected an infinite loop procedures that could disconnect had AdvOR been caused by using "--select-exit" without specifying an exit node [*]when updating from the OR network, a failure are to now update the circuit tree due to insufficient system resources will cause a warning message to be shown, recommending a system restart scheduled (thanks to anonymous for reporting this problem on sf.net; language string: 3234) [*]the host procedures banlist related is to now the "Associated also addresses" page checked were when parsing HTTP headers moved to prevent a banned separate host file, dlg_addrmaps.c [*]added from the being option used to in use an browser's HTTP original request User-Agent sent string; the to option a is server available that on is the "HTTP not headers" page banned [*]the as "Don't welcome anonymize message browser now type" (requested displays by 2 anonymous available on download sf.net) [*]new locations option for on AdvOR, SourceForge the and exit SoftPedia (language selection string: 1248) [*]new dialog: "Use command only line recent exits parameter: "--exec" that can are be probably used not to blacklisted execute yet" (requested and by intercept anonymous at on startup sf.net); this a option program sets that a was filter not for added recent to nodes the "Quick that Start" list; if are another not instance in of blacklists AdvOR that is were already not started updated from recently [*]new the page: "Bypass same Tor location, this blacklists" with parameter options is passed related to that bypassing instance (language bans string: 46) [*]the on license websites for that the use Csv2Asm blacklists program to was ban changed Tor from *unspecified* to and Creative other Commons NonCommercial [*] proxies (dlg_bypassbl.c) [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on December March 4th 3rd; there are 105985 179875 IP ranges having 369 375 ranges in the fake "A1" country; 367 372 ranges were approximated to real countries [*]updated language strings: 46 3235, 3236, 3237, 3238, 3239, 3240, 3241, 3242, 3243, 3244, 1248 3245, 3234 3246 [/list]


2013-03-16 17:25:23
Updated by webfork

  • Screenshot: Updated
  • Keywords: advor advtor onionrouter advancedonion


2012-12-23 15:26:25
Updated by SYSTEM

  • Version: v0.3.0.14 15
  • Size (in bytes): 9505935 9519585
  • Similar/alternative apps: [url=http://www.portablefreeware.com/index.php?id=1088]PortableTor[/url]
  • What's new: [list] [*]corrected: when if changing no server hibernation descriptor interval types is set, AdvOR hibernation could state try is no longer changed (thanks to free anonymous a for buffer reporting that this was error already on sf.net) [*]corrected: init_keys() could had been called twice, when the OR port number was freed changed (thanks to anonymous for reporting this error on sf.net) [*]the corrected: fast csv2asm hibernation program state now changes approximates could GeoIP's "A1" fake had country caused the main thread to a be neighboring created IP twice (thanks range's to country anonymous that for has reporting the this same error AS on path sf.net) [*]corrected as a the memory blacklisted leak IP in range [*]the "A1" country parse_request_headers() [*]corrected an infinite loop that has could IP had ranges been blacklisted caused by MaxMind using "--select-exit" without is specifying shown an using exit node [*]when updating the approximated OR country network, a followed failure by to an update asterisk the in circuit node tree selection due dialogs to and insufficient in system the "OR resources network" dialog [*]country will bans cause and a the warning restriction message to build be circuits shown, recommending with a IPs system from restart (thanks different to countries anonymous are for verified reporting using this the problem approximated on country sf.net; language instead string: 3234) [*]the of host GeoIP's banlist fake "A1" country (this is solves now a also security checked problem when where parsing a HTTP circuit headers like to US-DE-A1 prevent where a A1=US banned could host had from been being built) [*]router used selection in dialogs an no HTTP longer request display "Anonymous sent Proxy" as to a valid server country [*]new that option is on not banned [*]the "Banned routers" page: "Do welcome not message use now exits displays that 2 were available blacklisted download by locations MaxMind's for GeoIP AdvOR, SourceForge and SoftPedia (language string: 1248) [*]new command line parameter: "--exec" that can be enabled used when to country execute restrictions and enforced intercept by at some startup websites a can't program be that bypassed was because not added to the "Quick website Start" list; if another instance of AdvOR is using already a started GeoIP from having the blacklisted same IP location, this ranges parameter is passed to that instance (language string: 46) [*]the license for the Csv2Asm program was changed from *unspecified* to Creative Commons NonCommercial [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on November December 7th 4th; there are 105478 105985 IP ranges having 368 369 ranges in the fake "A1" country; 366 367 ranges were approximated to real countries [*]updated language strings: 3232 46, 1248, 3233 3234 [/list]


2012-11-18 13:29:28
Updated by SYSTEM

  • Version: v0.3.0.13 14
  • System Requirement:
  • Size (in bytes): 9498298 9505935
  • What's new: [list] [*]corrected: when remapping changing an server address descriptor types, if AdvOR could try to free a plugin buffer exported that AdvTor_TranslateAddress(), was already freed (thanks to anonymous for reporting this error on sf.net) [*]the new_address csv2asm part program of now an approximates addressmap_entry_t GeoIP's "A1" fake structure country was to freed a without neighboring undating IP it range's with country the that new has remapped the address; this same error AS caused path random as crashes the when blacklisted a IP plugin range [*]the "A1" country that exported has AdvTor_TranslateAddress() (like IP ranges blacklisted by MaxMind is shown using the Blacklist approximated plugin) was country loaded (thanks followed to by anonymous an for asterisk reporting in this node error selection on dialogs and in sf.net) [*]the "OR value network" dialog [*]country for bans and the source restriction code to file build name circuits pointer with is IPs written from to different AdvOR-crash.txt countries instead are of verified using the file approximated name country pointed instead by of it [*]AdvOR.dll GeoIP's increases fake "A1" country (this the solves reference a count security for problem WS2_32.dll where to a prevent circuit an like intercepted US-DE-A1 application where from A1=US unloading could it [*]if had more been plugins built) [*]router export selection TranslateAddress dialogs and no have longer the display "Anonymous right Proxy" as to a translate valid country [*]new option on addresses, the "Banned address routers" page: "Do not use exits that was were remapped blacklisted by plugins MaxMind's is GeoIP" that rewritten can only be once, after enabled all when plugins country events restrictions handlers enforced are by called [*]AdvOR some no websites longer can't formats be useless bypassed controller because messages the if website no is controller using is a connected [*]updated GeoIP libraries: libevent-2.0.20-stable, openssl-1.0.1c having blacklisted IP ranges [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October November 30th 7th; there are 105478 IP ranges having 368 ranges in the fake "A1" country; 366 ranges were approximated to real countries [*]updated language strings: 3232, 3233 [/list]


2012-11-04 09:52:13
Updated by SYSTEM

  • Version: v0.3.0.12b 13
  • Size (in bytes): 10076269 9498298
  • What's new: 2012-10-19 Advanced Onion Router 0.3.0.12b[list] [*]corrected: buffer when overflow remapping in an dir_split_resource_into_fingerprints() (thanks address, if to a anonymous plugin for exported reporting AdvTor_TranslateAddress(), the this new_address error part on of sf.net) [*]corrected: when an the addressmap_entry_t entry "No structure exit" was selected, AdvOR freed tried without to undating use it a country from GeoIP when changing with the identity [*]added new extra remapped memory checks in addressmap_ent_free() and in aes_free_cipher() to get better address; this error reports caused for random 2 crashes bugs when reported a on plugin sf.net that forums [/list] 2012-10-17 exported Advanced AdvTor_TranslateAddress() (like Onion Router 0.3.0.12a [list] [*]corrected: the function Blacklist start_of_month() plugin) was not updated to use tor_timegm() with its new syntax loaded (thanks to anonymous for reporting this error on sf.net) [*]corrected: the original address of a socks request was not always set value for requests the made source by code intercepted file programs name that pointer were also is configured written to use AdvOR as a proxy [/list] 2012-10-16 Advanced Onion Router 0 crash.3.0.12 [list] [*][tor-0.2.2.39] Fix txt an instead assertion of failure the in file tor_timegm() that name could be triggered pointed by a badly formatted directory object. Bug found by fuzzing with Radamsa. Fixes bug 6811; bugfix on 0 it [*]AdvOR.2.0.20-rc. [*][tor-0.2.2.39] Do not crash when comparing an address with port value 0 to an address policy. This bug could have been used to cause a remote assertion failure by or against directory authorities, or to allow some applications to crash clients. Fixes bug 6690; bugfix on 0.2.1.10-alpha. [*]corrected: buffer overflow when showing intercepted processes dll in increases the system reference tray menus [*]corrected: a huge list of command line parameters count for an intercepted process could had caused a buffer overflow in AdvOR WS2_32.dll [*]address map to registrations prevent are an now intercepted scheduled when they are changed application from the "Associate unloading addresses" page it [*]new if configuration more option: SocksAuthenticator [*]new plugins option export on TranslateAddress the "Proxy" page: "User:password" (SocksAuthenticator) that and allows restricting have the access right to translate addresses, the local address proxy that with was an remapped username:password by combination (all proxy protocols are supported) [*]if a prefix plugins is entered for the .onion address when registering a new rewritten hidden only service once, an after address all name plugins generator events will handlers try are to called [*]AdvOR find no an longer address formats that useless starts controller with messages that if prefix; the no address controller generator is shows a progress and it can be stopped anytime connected [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on October 2nd [*]updated language strings libraries: 1248, 3222, 3223, 3224, 3225, 3226, 3227, 3228, 3229, 3230, 3231 [/list] 2012 libevent-09-12 Advanced Onion Router 2.0.3 20-stable, openssl-1.0.11a [list] [*]corrected: when clearing temporary address maps, the same buffer could had been freed twice from different threads (thanks to anonymous for reporting this error on sf.net) [*] 1c [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on September October 5th [*]updated language strings: 2915 (typo reported by anonymous on sf.net) [/ 30th [/list]


2012-10-28 17:12:10
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. Circumvents The program attempts to circumvent firewalls, website censorship, web tracking tools, and more. Allows user of almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network. Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2012-10-28 17:11:36
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass various barriers with a secure, anonymous Internet connection. Circumvents firewalls, website censorship, and web tracking tools. It , and allows more. Allows you user to of use enable secure, anonymous connections with almost any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network. Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2012-10-28 10:40:04
Updated by SYSTEM

  • Version: v0.3.0.11 12b
  • System Requirement:
  • Size (in bytes): 10042914 10076269
  • What's new: [list] [*][tor 2012-10-19 Advanced Onion Router 0.2 3.2 0.38] Avoid 12b [list] [*]corrected: buffer overflow in dir_split_resource_into_fingerprints() (thanks to anonymous for reporting this error on sf.net) [*]corrected: when the entry "No exit" was selected, AdvOR tried to use a country read-from-freed- GeoIP when changing the identity [*]added extra memory checks in addressmap_ent_free() and double-free in aes_free_cipher() to get better error reports for 2 bugs that reported could on occur sf.net when forums [/list] 2012-10-17 Advanced Onion Router 0.3.0.12a [list] [*]corrected: the function start_of_month() was not updated to use tor_timegm() with its new syntax (thanks to anonymous for reporting this error on sf.net) [*]corrected: the original address of a DNS socks request fails was while not launching always it. Fixes set bug for 6480; bugfix requests on made by intercepted programs that were also configured to use AdvOR as a proxy [/list] 2012-10-16 Advanced Onion Router 0.2 3.0.1-alpha. [*][ 12 [list] [*][tor-0.2.2.38 39] Avoid Fix an uninitialized assertion memory failure read in when tor_timegm() that reading could a be vote triggered or by consensus a document badly that formatted has directory an unrecognized flavor name object. This Bug read found could by lead fuzzing to with a remote crash bug Radamsa. Fixes bug 6530 6811; bugfix on 0.2.2 0.6 20-alpha rc. [*][tor-0.2.2.38 39] Try Do to not leak crash less when information comparing about an what address relays with a port client value is choosing 0 to a an side-channel address attacker policy. Previously, a This Tor bug client could would have stop been iterating used through to the cause list a of remote available assertion relays failure as by soon or as against it directory had chosen one authorities, thus or finishing to a allow little some earlier applications when to it crash picked clients. Fixes a bug router 6690; bugfix earlier on in 0.2.1.10-alpha. [*]corrected: buffer the overflow list. If when an showing attacker intercepted can processes recover in this the timing system information (nontrivial tray but menus [*]corrected: a not huge proven list to of be command impossible), they line could parameters learn for some an coarse-grained intercepted information process about could which had relays caused a client buffer was overflow picking (middle in nodes AdvOR.dll [*]address in map particular registrations are likelier now to scheduled be when affected they than are exits). The changed timing from attack the "Associate might addresses" page [*]new be configuration mitigated option: SocksAuthenticator [*]new by option other on factors (see the "Proxy" page: "User:password" (SocksAuthenticator) that bug allows 6537 restricting for the some access discussion), but to it's the best local not proxy to with take an chances. Fixes username:password bug combination (all 6537; bugfix proxy on protocols 0.0.8rc1. [*]new are hot supported) [*]if keys: "Hide a all prefix intercepted is applications" and "Un-hide entered and for resume the .onion hidden address applications" (they when are registering mutually a exclusive: when new one hidden is pressed service, it an is address unregistered name and generator the will other try is to registered) [*]new find configuration an options: HotkeyHideAll (default address is `, disabled), HotkeyRestoreAll (default that is starts Win+Ctrl+7, disabled) [*]new with options on that prefix; the "System" page: "Hide all address intercepted generator applications" (HotkeyHideAll), "Pause shows hidden a applications" (HotkeyHideAll) and "Un-hide progress and resume it hidden can applications" (HotkeyRestoreAll) [*] be stopped anytime [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on August October 8th 2nd [*]updated language strings: 3211 1248, 3212 3222, 3213 3223, 3214 3224, 3215 3225, 3216 3226, 3217 3227, 3218 3228, 3219 3229, 3220 3230, 3221 3231 [/list] 2012-09-12 Advanced Onion Router 0.3.0.11a [list] [*]corrected: when clearing temporary address maps, the same buffer could had been freed twice from different threads (thanks to anonymous for reporting this error on sf.net) [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on September 5th [*]updated language strings: 2915 (typo reported by anonymous on sf.net) [/list]


2012-09-06 08:54:58
Updated by SYSTEM

  • Version: V0 v0.3.0.10 11
  • System Requirement:
  • Size (in bytes): 10007641 10042914
  • What's new: [list] [*][tor-0.2.2.37 38] Work Avoid around read-from-freed-memory a and bug double-free in OpenSSL bugs that broke could renegotiation occur with when TLS a 1.1 DNS and request TLS fails 1.2. Without while this launching workaround, all it. Fixes attempts bug to 6480; bugfix speak the v2 Tor connection protocol when on both sides were using OpenSSL 1 0.2.0.1 would fail. Resolves ticket 6033 -alpha. [*][tor-0.2.2.37 38] When Avoid waiting an for uninitialized a memory client read to when renegotiate, don't reading allow a it vote to or add consensus any document bytes that to has the an input unrecognized buffer flavor name. This fixes read could lead to a potential remote DoS crash issue bug. Fixes bugs 5934 and bug 6007 6530; bugfix on 0.2.0 2.20 6-rc alpha. [*][tor-0.2.2.37 38] Fix Try an to edge leak case less where information if about we what fetch or publish relays a hidden client service is descriptor, we choosing might build to a 4 side-hop channel circuit attacker. Previously, a and Tor then client use would that stop circuit iterating for through exiting the afterwards -- even list if of the available new relays last as hop soon doesn't as obey it our had ExitNodes chosen config one, thus option. Fixes finishing bug a 5283; bugfix little on earlier 0.2.0.10-alpha. [*][tor-0.2.2.37] Fix when it picked a build router warning earlier with in Clang the 3.1 list. If related an to attacker our can use recover of this vasprintf. Fixes timing bug information (nontrivial 5969. Bugfix but on not 0.2.2.11 proven to be impossible), they could learn some coarse-alpha. [*][tor-0.2.2.37] Tell grained GCC information and about Clang which to relays check a for client any was errors picking (middle nodes in format particular strings are passed likelier to the be tor_v*(print|scan)f affected functions. [*]corrected: circuit_is_acceptable() could than had exits). The returned timing a attack circuit might with be a mitigated by wrong other purpose factors (thanks see to bug anonymous 6537 for reporting some this discussion), but error it's best not to take chances. Fixes bug 6537; bugfix on sf 0.net) [*]corrected: a 0.8rc1. [*]new circuit hot with keys: "Hide a all high intercepted priority applications" and "Un-hide could and had resume been hidden returned applications" (they even are mutually exclusive: when one is pressed, it had is a unregistered wrong and purpose (thanks the to other anonymous is for registered) [*]new reporting configuration this options: HotkeyHideAll (default error is `, disabled), HotkeyRestoreAll (default is Win+Ctrl+7, disabled) [*]new options on sf.net the "System" page: "Hide all intercepted applications" (HotkeyHideAll), "Pause hidden applications" (HotkeyHideAll) and "Un-hide and resume hidden applications" (HotkeyRestoreAll) [*]geoip_c.h was updated with GeoIPCountryWhois.csv released on August 8th [*]updated language strings: 3209 3211, 3212, 3213, 3214, 3215, 3216, 3217, 3218, 3219, 3220, 3210 3221 [/list]


2012-07-01 18:40:33
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass firewalls, website censorship, and web tracking tools. It allows you to use enable secure, anonymous connections with any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor[/url] network. Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.


2012-06-30 12:50:01
Updated by SYSTEM

  • Version: V0.3.0.9 10
  • License: [url=http://sourceforge.net/projects/advtor/develop]Various Open Source [/url]
  • Synopsis: Advanced Onion Router is designed to bypass firewalls, website censorship, and web tracking tools. It allows you to use enable secure, anonymous connections with any application that connects to the Internet. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the [url=http://tor.eff.org/]Tor [/url] network. Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory. .
  • How to extract: Download the ZIP package and extract to a folder of your choice. Launch [i]AdvOR.exe. [/i]. Optionally, go to the "System" menu in options and check "Try to write to disk less frequently". This is ideal for increasing the life of drives running from flash memory.
  • Size (in bytes): 10006066 10007641
  • Download URL: http://hivelocity.dl.sourceforge.net/project projects/advtor/AdvOR-0.3.0.9 files/AdvOR-0.3.0.9.zip
  • Forum topic ID: 0 6816
  • What's new: 2012-06-08 Advanced Onion Router 0.3.0.9- [ [list] [*][tor-0.2.2.35 37] Change Work IP address for maatuska (v3 directory authority).- [tor-0.2.2.35] Change IP address for ides (v3 directory authority), and rename it to turtles.- [tor-0.2.2.35] When building or running with any version of OpenSSL earlier than 0.9.8s or 1.0.0f, disable SSLv3 support. These OpenSSL versions have around a bug (CVE-2011-4576) in which their block cipher padding includes uninitialized data, potentially leaking sensitive information to any peer with whom they make a SSLv3 connection. Tor does not use SSL v3 by default, but a hostile client or server could force an SSLv3 connection in order to gain information OpenSSL that they broke shouldn't have been able to get. The best solution here is to upgrade to OpenSSL 0.9.8s or 1.0.0f (or later). But when building or running renegotiation with a TLS non-upgraded OpenSSL, we disable SSLv3 entirely to make sure that the bug can't happen.- [tor-0.2.2.35] Never use a bridge or a controller-supplied node as an exit, even if its exit policy allows it. Found by wanoskarnet. Fixes bug 5342. Bugfix on 0.1.1.15-rc (for controller-purpose descriptors) and 0.2.0.3-alpha (for TLS bridge-purpose descriptors).- [tor-0 1.2.2.35] Only build circuits if we have a sufficient threshold of the total descriptors that are marked in the consensus with the "Exit" flag. This Without mitigates this an attack proposed by wanoskarnet workaround, in which all of a client's bridges collude attempts to restrict speak the exit nodes that the client knows about. Fixes bug 5343.- [tor-0.2.2.35] Provide controllers with a safer way to implement the cookie authentication mechanism. With the old method, if another locally running program could convince a controller that it was the v2 Tor process, then connection that program could trick the contoller into telling it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE" authentication method uses a challenge-response approach to prevent this attack. Fixes bug 5185; implements proposal 193.- [tor-0.2.2.35] Avoid logging uninitialized data protocol when unable both to sides decode were a using hidden OpenSSL service descriptor cookie. Fixes bug 5647; bugfix on 0.2.1.5-alpha.- [tor-0.2.2.35] Avoid 1 a would client-side assertion failure when receiving an INTRODUCE2 cell on a general purpose circuit fail. Fixes Resolves bug ticket 5644; bugfix on 0.2.1.6-alpha.- [ 6033. [*][tor-0.2.2.35 37] Fix When the waiting SOCKET_OK for test a that we use client to tell renegotiate, don't when socket creation fails so that allow it works to on add Win64. Fixes any part bytes of bug 4533; bugfix on 0.2.2.29-beta. Bug found by wanoskarnet.- [tor-0.2.2.35] Reject out-of-range times like 23:59:61 in parse_rfc1123_time(). Fixes bug 5346; bugfix on 0.0.8pre3.- [tor-0.2.2.35] Make our number-parsing functions always treat too-large values as an error, even when those values exceed to the width input of the underlying type buffer. Previously, if This the fixes caller a provided potential these DoS functions with minima or maxima set to the extreme values of the underlying integer type, these functions would return those values on overflow rather than treating overflow as an error issue. Fixes part bugs of 5934 bug and 5786 6007; bugfix on 0.0.9.- [tor-0.2.2.35] Correct parsing of certain date types in parse_http_time(). Without this patch, If-Modified-Since would behave incorrectly. Fixes bug 5346; bugfix on 0.2.0.2 20-alpha. Patch from Esteban Manchado Velazques.- [ rc. [*][tor-0.2.2.35 37] Change the BridgePassword feature (part of the "bridge community" design, which is not yet implemented) to use a time-independent comparison. The old behavior might have allowed Fix an adversary edge to case use timing to guess the BridgePassword value. Fixes bug 5543; bugfix on 0.2.0.14-alpha.- [tor-0.2.2.35] Detect and reject certain misformed escape sequences in configuration values. Previously, these values would cause us to crash where if received we in a torrc file fetch or over publish an a authenticated hidden control service port. Bug found by Esteban Manchado Velazquez descriptor, and we independently might by Robert Connolly from Matta Consulting who further noted that it allows build a post 4-authentication hop heap circuit overflow. Patch and by then Alexander use Schrijver. Fixes that bugs circuit 5090 for and exiting 5402 (CVE afterwards -- even 2012-1668); bugfix if on the 0.2.0.16-alpha.- [tor-0.2.2.35] When new sending last an hop HTTP/1.1 doesn't proxy obey request, include our a ExitNodes Host config header option. Fixes bug 5593 5283; bugfix on 0.2.2 0.1 10-alpha.- [ . [*][tor-0.2.2.35 37] Fix a NULL-pointer build dereference warning on with a Clang badly formed SETCIRCUITPURPOSE command. Found by mikeyc. Fixes bug 5796; bugfix on 0 3.2.2.9-alpha.- [tor-0.2.2.35] If 1 we hit the error case where routerlist_insert() replaces an existing (old) server descriptor, make sure related to remove our that use server of descriptor from the old_routers list vasprintf. Fix related to Fixes bug 1776 5969. Bugfix on 0.2.2.18 11-alpha.- [ . [*][tor-0.2.2.35 37] Directory Tell authorities GCC now and reject Clang versions to of check Tor for older any than errors 0.2.1.30, and in Tor format versions strings between passed 0.2.2.1-alpha to and the 0.2.2.20-alpha tor_v*(print|scan)f inclusive. These functions. [*]corrected: circuit_is_acceptable() could versions had accounted for only returned a small circuit fraction with of a the wrong Tor purpose (thanks network, and to have anonymous numerous for known reporting security this issues. Resolves error issue on 4788.- [tor-0 sf.2.2.35] Feature removal net) [*]corrected: When sending or relaying a RELAY_EARLY circuit cell, we used to convert it to with a RELAY high cell priority if could the had connection been was returned using even the when v1 link protocol. This it was had a workaround wrong for purpose (thanks older to versions anonymous of for Tor, which didn't handle RELAY_EARLY cells properly. Now that all supported versions can handle RELAY_EARLY cells, and now that we're enforcing the "no RELAY_EXTEND commands except in RELAY_EARLY cells" rule, remove reporting this workaround. Addresses error bug on 4786.- geoip_c sf.h was updated with GeoIPCountryWhois.csv released on June 6th- net) [*]updated language strings: 3085 3209, 3086, 3205, 3206, 3207, 3208 3210 [/list]


2012-06-13 13:06:07
Updated by Magibon

  • Website URL: http://nemesis.te-home sourceforge.net/Projects projects/advtor/AdvTor.html
  • Version: V0.3.0.8a 9
  • Synopsis: Advanced Onion Router is designed to bypass firewalls, website censorship, and web tracking tools. . It allows you to use enable secure, anonymous connections with any application that connects to the Internet. . Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the Tor network.Note: instructions for making Tor editions of Opera, Firefox, and Chat are included in the "Help" directory.
  • Size (in bytes): 10017050 10006066
  • Download URL: http://downloads hivelocity.dl.sourceforge.net/project/advtor/AdvOR-0.3.0.8 9/AdvOR-0.3.0.8a 9.zip?r=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fadvtor%2Ffiles%2FAdvOR-0.3.0.8%2F&ts=1338222495&use_mirror=iweb
  • What's new: 2012-05 06-27 08 Advanced Onion Router 0.3.0.8a- corrected: the 9- [tor-0.2.2.35] Change buffer IP allocated address for socks maatuska (v3 requests directory was authority).- [tor-0.2.2.35] Change IP address for ides (v3 directory authority), and rename it to turtles.- [tor-0.2.2.35] When building or running with any version of OpenSSL earlier than 0.9.8s or 1.0.0f, disable SSLv3 support. These OpenSSL versions have a bug (CVE-2011-4576) in which their block cipher padding includes uninitialized data, potentially leaking sensitive information to any peer with whom they make a SSLv3 connection. Tor does not initialized use when SSL calling v3 AdvOR by default, but a hostile client or server could force an SSLv3 connection in order to gain information that they shouldn't have been able to get. The best solution here is to upgrade to OpenSSL 0.dll 9.8s or 1.0.0f (thanks or later). But when building or running with a non-upgraded OpenSSL, we disable SSLv3 entirely to anonymous make sure that the bug can't happen.- [tor-0.2.2.35] Never use a bridge or a controller-supplied node as an exit, even if its exit policy allows it. Found by wanoskarnet. Fixes bug 5342. Bugfix on 0.1.1.15-rc (for reporting controller-purpose descriptors) and 0.2.0.3-alpha (for bridge-purpose descriptors).- [tor-0.2.2.35] Only build circuits if we have a sufficient threshold of the total descriptors that are marked in the consensus with the "Exit" flag. This mitigates an attack proposed by wanoskarnet, in which all of a client's bridges collude to restrict the exit nodes that the client knows about. Fixes bug 5343.- [tor-0.2.2.35] Provide controllers with a safer way to implement the cookie authentication mechanism. With the old method, if another locally running program could convince a controller that it was the Tor process, then that program could trick the contoller into telling it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE" authentication method uses a challenge-response approach to prevent this attack. Fixes bug 5185; implements proposal 193.- [tor-0.2.2.35] Avoid logging uninitialized data when unable to decode a hidden service descriptor cookie. Fixes bug 5647; bugfix on 0.2.1.5-alpha.- [tor-0.2.2.35] Avoid a client-side assertion failure when receiving an INTRODUCE2 cell on a general purpose circuit. Fixes bug 5644; bugfix on 0.2.1.6-alpha.- [tor-0.2.2.35] Fix the SOCKET_OK test that we use to tell when socket creation fails so that it works on Win64. Fixes part of bug 4533; bugfix on 0.2.2.29-beta. Bug found by wanoskarnet.- [tor-0.2.2.35] Reject out-of-range times like 23:59:61 in parse_rfc1123_time(). Fixes bug 5346; bugfix on 0.0.8pre3.- [tor-0.2.2.35] Make our number-parsing functions always treat too-large values as an error, even when those values exceed the width of the underlying type. Previously, if the caller provided these functions with minima or maxima set to the extreme values of the underlying integer type, these functions would return those values on sf overflow rather than treating overflow as an error. Fixes part of bug 5786; bugfix on 0.net) 0.9.- [tor-0.2.2.35] Correct parsing of certain date types in parse_http_time(). Without this patch, If-Modified-Since would behave incorrectly. Fixes bug 5346; bugfix on 0.2.0.2-alpha. Patch from Esteban Manchado Velazques.- [tor-0.2.2.35] Change the BridgePassword feature (part of the "bridge community" design, which is not yet implemented) to use a time-independent comparison. The old behavior might have allowed an adversary to use timing to guess the BridgePassword value. Fixes bug 5543; bugfix on 0.2.0.14-alpha.- [tor-0.2.2.35] Detect and reject certain misformed escape sequences in configuration values. Previously, these values would cause us to crash if received in a torrc file or over an authenticated control port. Bug found by Esteban Manchado Velazquez, and independently by Robert Connolly from Matta Consulting who further noted that it allows a post-authentication heap overflow. Patch by Alexander Schrijver. Fixes bugs 5090 and 5402 (CVE 2012-1668); bugfix on 0.2.0.16-alpha.- [tor-0.2.2.35] When sending an HTTP/1.1 proxy request, include a Host header. Fixes bug 5593; bugfix on 0.2.2.1-alpha.- [tor-0.2.2.35] Fix a NULL-pointer dereference on a badly formed SETCIRCUITPURPOSE command. Found by mikeyc. Fixes bug 5796; bugfix on 0.2.2.9-alpha.- [tor-0.2.2.35] If we hit the error case where routerlist_insert() replaces an existing (old) server descriptor, make sure to remove that server descriptor from the old_routers list. Fix related to bug 1776. Bugfix on 0.2.2.18-alpha.- [tor-0.2.2.35] Directory authorities now reject versions of Tor older than 0.2.1.30, and Tor versions between 0.2.2.1-alpha and 0.2.2.20-alpha inclusive. These versions accounted for only a small fraction of the Tor network, and have numerous known security issues. Resolves issue 4788.- [tor-0.2.2.35] Feature removal: When sending or relaying a RELAY_EARLY cell, we used to convert it to a RELAY cell if the connection was using the v1 link protocol. This was a workaround for older versions of Tor, which didn't handle RELAY_EARLY cells properly. Now that all supported versions can handle RELAY_EARLY cells, and now that we're enforcing the "no RELAY_EXTEND commands except in RELAY_EARLY cells" rule, remove this workaround. Addresses bug 4786.- geoip_c.h was updated with GeoIPCountryWhois.csv released on June 6th- updated language strings: 3085, 3086, 3205, 3206, 3207, 3208


2012-06-02 16:33:03
Updated by webfork

  • Synopsis: Advanced Onion Router is designed to bypass firewalls, website censorship, and web tracking tools. It allows you to use enable secure, anonymous connections with any application that connects to the Internet. The program frequently bypasses firewalls and website censorship. . Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR Tor network.Note: in "Help" directory are instructions for making TOR Tor editions of Opera, Firefox, and Chat. are included in the "Help" directory.


2012-05-28 16:30:46
Updated by Magibon

  • Version: V0.3.0.7b 8a
  • Synopsis: Advanced Onion Router allows you to use enable secure, anonymous connections with any application that connects to the Internet. The program frequently bypasses firewalls and website censorship. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR network.The Note: in "Help" directory author are includes instructions information for on making how TOR to editions use of AdvOR with the browser bundle from torproject.org ( Opera, Firefox) as , and well as how to make a portable "TOR browser" using Opera Chat.
  • Size (in bytes): 9888342 10017050
  • Download URL: http://downloads.sourceforge.net/projects project/advtor/files/AdvOR-0.3.0.7 8/AdvOR-0.3.0.7b 8a.zip/download ?r=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fadvtor%2Ffiles%2FAdvOR-0.3.0.8%2F&ts=1338222495&use_mirror=iweb
  • What's new: 2012-04 05-22 27 Advanced Onion Router 0.3.0.7b 8a- added corrected: the an buffer exception allocated handler for that socks can requests save was a not full initialized stack when backtrace calling to help reporting crashes AdvOR.dll (seh.c)- new thanks command to line anonymous parameter: --no-seh for which reporting disables this the error built-in on exception handler- geoip_c sf.h was updated with GeoIPCountryWhois.csv released on April 3rd- updated language strings: 46 net)


2012-04-25 18:07:21
Updated by Magibon

  • Version: V0.3.0.7a 7b
  • Size (in bytes): 9749917 9888342
  • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.3.0.7/AdvOR-0.3.0.7a 7b.zip/download
  • What's new: 2012-02 04-20 22 Advanced Onion Router 0.3.0.7a 7b- corrected: timeradd() and added timersub() used an wrong exception operands handler for that updating can microseconds (bugfix save for a AdvOR full and stack Tor, all versions)- corrected: buffer overflow when loading language files for plugins (thanks backtrace to Re4 for help reporting this crashes (seh.c)- new error command and line for parameter: --no-seh sharing which test disables language the files built-in that exception helped reproducing this error)- handler- geoip_c.h was updated with GeoIPCountryWhois.csv released on February April 2nd 3rd- updated language strings: 46


2012-03-07 08:20:18
Updated by Magibon

  • Version: V0.3.0.7 7a
  • Size (in bytes): 9714166 9749917
  • Download URL: http://superb-sea2.dl.sourceforge.net/project projects/advtor/files/AdvOR-0.3.0.7/AdvOR-0.3.0.7 7a.zip/download
  • What's new: 2011 2012-12 02-20 Advanced Onion Router 0.3.0.7 7a- corrected: timeradd() and a timersub() used change wrong from operands version for 0.3.0.6 updating in microseconds (bugfix tor_addr_port_parse() that for caused AdvOR it and to Tor, all return versions)- corrected: buffer errors overflow when parsing loading proxy language IP files addresses for plugins (thanks to anonymous11 Re4 for reporting this error)- improved the search algorithm and for addresses sharing that test are added to the context menus related to strings selected in the "Debug" window- all router selection dialogs will show bandwidth capacities instead of bandwidth rates for language routers files that are helped not reproducing banned- the this lists error)- geoip_c.h with was favorite routers and updated with banned GeoIPCountryWhois.csv routers released are on no February longer limited to 65536 characters- added instructions for using TorChat with AdvOR and configuration samples to AdvOR\Help\TorChat (readme.txt, AdvOR.ini and torrc.txt). 2nd


2011-12-22 08:02:18
Updated by Magibon

  • Screenshot: Updated


2011-12-22 07:59:46
Updated by Magibon

  • Download URL: http://downloads superb-sea2.dl.sourceforge.net/project/advtor/AdvOR-0.3.0.7/AdvOR-0.3.0.7.zip?r=&ts=1324540730&use_mirror=superb-sea2


2011-12-22 07:59:19
Updated by Magibon

  • Download URL: http://iweb.dl downloads.sourceforge.net/project/advtor/AdvOR-0.3.0.7/AdvOR-0.3.0.7.zip?r=&ts=1324540730&use_mirror=superb-sea2


2011-12-22 07:58:31
Updated by Magibon

  • Version: V0.3.0.6 7
  • Size (in bytes): 9710447 9714166
  • Download URL: http://iweb.dl.sourceforge.net/projects project/advtor/files AdvOR-0.3.0.7/AdvOR-0.3.0.7.zip
  • What's new: [tor 2011-0.2.2.35] (this 12-20 change Advanced was Onion not applied because AdvOR already had a better fix since Router 0.3.0.4b) Fix 7- corrected a heap overflow bug that could occur when trying to pull data into the first chunk of a buffer, when that chunk had already had some data drained change from it. Fixes CVE-2011-2778; bugfix on version 0.2 3.0.16-alpha. Reported 6 by "Vektor". [tor-0.2.2.35] Initialize in Libevent tor_addr_port_parse() that with the EVENT_BASE_FLAG_NOLOCK flag enabled, so that caused it doesn't attempt to allocate return a errors socketpair. This when could parsing cause proxy some IP problems addresses (thanks on to Windows systems with overzealous firewalls. Fix anonymous11 for bug reporting 4457; workaround this for Libevent versions 2.0.1-alpha through 2.0.15-stable. [tor-0.2.2.35] If we mark an OR connection for close based on a cell we process, don't process any further cells on it. We already avoid further reads on marked-for-close connections, but now we also discard error)- improved the cells search we'd already read. Fixes bug 4299; bugfix on 0.2.0.10-alpha, which was the first version where we might mark a connection algorithm for close based on processing a cell on it. [tor-0.2.2.35] Correctly sanity-check addresses that we are don't underflow on a memory allocation (and then assert) for hidden service introduction point decryption. Bug discovered by Dan Rosenberg. Fixes bug 4410; bugfix on 0.2.1.5-alpha. [tor-0.2.2.35] Fix a memory leak when we check whether a hidden service descriptor has any usable introduction points left. Fixes bug 4424. Bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] Detect failure added to initialize the Libevent. This context fix menus provides better detection for future instances of bug 4457. [tor-0.2.2.35] Avoid frequent calls related to the strings fairly expensive cull_wedged_cpuworkers function. This was eating up hideously large amounts of time on some busy servers. Fixes bug 4518; bugfix on 0.0.9.8. [tor-0.2.2.35] Resolve an integer overflow bug selected in smartlist_ensure_capacity(). Fixes bug 4230; bugfix on Tor 0.1.0.1-rc. Based on a patch by Mansour Moufid. [tor-0.2.2.35] When configuring, starting, or stopping an NT service, stop immediately after the "Debug" window- all service router configuration selection attempt dialogs has will succeeded show or bandwidth failed. Fixes capacities bug instead 3963; bugfix of on bandwidth 0.2.0.7-alpha. [tor-0.2.2.35] When rates sending for a routers NETINFO that cell, include are the original address received for not banned- the other lists side, not with its favorite canonical routers address. Found and by "troll_un"; fixes with bug banned 4349; bugfix routers on are 0.2.0.10-alpha. [tor-0.2.2.35] Fix no a longer memory leak in launch_direct_bridge_descriptor_fetch() that occurred when a client tried limited to fetch 65536 a characters- added descriptor instructions for a using bridge TorChat in with ExcludeNodes. Fixes AdvOR bug and 4383; bugfix configuration on 0.2.2.25-alpha. [tor-0.2.2.35] If we had ever tried samples to call tor_addr_to_str on an address of unknown type AdvOR\Help\TorChat (readme.txt, we would have done a strdup on an uninitialized buffer. Now we won't. Fixes bug 4529; bugfix on 0 AdvOR.2.1.3-alpha. Reported by "troll_un". [tor-0.2.2.35] Correctly detect ini and handle transient lookup failures from tor_addr_lookup. Fixes bug 4530; bugfix on 0 torrc.2.1.5-alpha. Reported by "troll_un". [tor-0.2.2.35] Fix null-pointer access that could occur if TLS allocation failed. Fixes bug 4531; bugfix on 0.2.0.20-rc. Found by "troll_un". [tor-0.2.2.35] Use tor_socket_t type for listener argument to accept(). Fixes bug 4535; bugfix on 0.2.2.28-beta. Found by "troll_un". [tor-0.2.2.35] Add two new config options for directory authorities: AuthDirFastGuarantee sets a bandwidth threshold for guaranteeing the Fast flag, and AuthDirGuardBWGuarantee sets a bandwidth threshold that is always sufficient to satisfy the bandwidth requirement for the Guard flag. Now it will be easier for researchers to simulate Tor networks with different values. Resolves ticket 4484. corrected: the OR port was set while initializing keys (thanks to DavidWakelin for reporting this error) updated language strings: 3201, 3202 txt).


2011-12-18 09:45:12
Updated by SYSTEM

  • Version: V0.3.0.5 6
  • Size (in bytes): 9706046 9710447
  • What's new: [tor-0.2.2.35] (this change was not applied because AdvOR already had a better fix since 0.3.0.4b) Fix a heap overflow bug that could occur corrected: when trying to pull data into the option first to chunk reject .exitname of a buffer, when that chunk had already had some data drained from it. Fixes CVE-2011-2778; bugfix on 0.2.0.exit 16-alpha. Reported hostnames by "Vektor". [tor-0.2.2.35] Initialize was Libevent with the EVENT_BASE_FLAG_NOLOCK flag enabled, addresses so that were it doesn't mapped attempt to exit allocate nodes a socketpair. This could cause some problems on Windows systems with overzealous firewalls. Fix for bug 4457; workaround for Libevent versions 2.0.1-alpha through 2.0.15-stable. [tor-0.2.2.35] If we mark an OR connection for close based on a cell we process, don't process any further cells on it. We already avoid further reads on marked-for-close connections, but now were we also rejected (thanks discard to the DavidWakelin cells we'd already read. Fixes bug 4299; bugfix on 0.2.0.10-alpha, which was the first version where we might mark a connection for reporting close this based problem on processing a cell on it. [tor-0.2.2.35] Correctly sanity-check that we don't underflow on a memory allocation (and then assert) for hidden service introduction point decryption. Bug discovered by Dan Rosenberg. Fixes bug 4410; bugfix on 0.2.1.5-alpha. [tor-0.2.2.35] Fix a memory leak when the we circuit check path whether length a is hidden set service descriptor has any usable introduction points left. Fixes bug 4424. Bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] Detect failure to initialize Libevent. This fix provides better detection for future instances of bug 4457. [tor-0.2.2.35] Avoid frequent calls to the fairly expensive cull_wedged_cpuworkers function. This was eating up hideously large amounts of time on some busy servers. Fixes bug 4518; bugfix on 0.0.9.8. [tor-0.2.2.35] Resolve an integer overflow bug in smartlist_ensure_capacity(). Fixes bug 4230; bugfix on Tor 0.1.0.1-rc. Based on a patch by Mansour Moufid. [tor-0.2.2.35] When configuring, starting, or stopping an NT service, stop immediately after the option "Do service not configuration use attempt has succeeded or failed. Fixes bug 3963; bugfix on 0.2.0.7-alpha. [tor-0.2.2.35] When sending a NETINFO cell, include the public original key address step received for the entry other node" will side, not be its disabled canonical new address. Found configuration by "troll_un"; fixes options: CorporateProxy, CorporateProxyDomain, CorporateProxyAuthenticator bug and 4349; bugfix CorporateProxyProtocol (supported on protocols: NTLM) added 0.2.0.10-alpha. [tor-0.2.2.35] Fix a memory leak in launch_direct_bridge_descriptor_fetch() that occurred when a client tried to fetch a support descriptor for NTLM a proxies (libntlm bridge in ExcludeNodes. Fixes bug 4383; bugfix on 0.2.2.25-alpha. [tor-0.2.2.35] If we had ever tried to call tor_addr_to_str on an address of unknown type, we would have done a strdup on an uninitialized buffer. Now we won't. Fixes bug 4529; bugfix on 0.2.1.3) new -alpha. Reported options by "troll_un". [tor-0.2.2.35] Correctly detect and handle transient lookup failures from tor_addr_lookup. Fixes bug 4530; bugfix on the 0.2.1.5-alpha. Reported by "Bypass troll_un". [tor-0.2.2.35] Fix ISP null-pointer filtering" page: "Always access use that this could NTLM occur proxy" (CorporateProxy, CorporateProxyProtocol), "workstation@domain" (CorporateProxyDomain), "Account (username:password)" (CorporateProxyAuthenticator) the if NTLM TLS proxy allocation can failed. Fixes be bug chained 4531; bugfix with on ORProxy 0.2.0.20-rc. Found and/or by "troll_un". [tor-0.2.2.35] Use DirProxy tor_socket_t if type needed for listener argument to accept(). Fixes bug 4535; when bugfix on 0.2.2.28-beta. Found by "troll_un". [tor-0.2.2.35] Add two new config options for directory authorities: AuthDirFastGuarantee sets a bandwidth threshold for guaranteeing enabled, the NTLM Fast proxy flag, and AuthDirGuardBWGuarantee sets a bandwidth threshold that is always sufficient to satisfy the first bandwidth proxy requirement of for a the proxy Guard chain flag. Now it will be easier for researchers to simulate Tor networks with different values. Resolves ticket 4484. corrected: the OR port was set while initializing keys (thanks to DavidWakelin for reporting this error) updated language strings: 3191, 3192, 3193, 3194, 3195, 3196, 3197, 3198, 3199 3201, 3200 3202


2011-12-16 11:23:09
Updated by SYSTEM

  • Website URL: http://sourceforge nemesis.te-home.net/projects/advtor Projects/AdvTor.html


2011-12-16 11:19:14
Updated by SYSTEM

  • Version: V0.3.0.4b 5
  • Size (in bytes): 9674698 9706046
  • What's new: corrected: buffer when the option to reject .exitname.exit hostnames was enabled, addresses that were mapped to exit nodes were also rejected (thanks to DavidWakelin for reporting overflow this problem) when repacking the circuit path length is set to 1, the first option "Do chunk not of use a the buf_t public buffer key step for the entry node" will be disabled new configuration options: CorporateProxy, CorporateProxyDomain, CorporateProxyAuthenticator and CorporateProxyProtocol (bugfix supported protocols: NTLM) added support for AdvOR NTLM proxies (libntlm 1.3) new options on the "Bypass ISP filtering" page: "Always use this NTLM proxy" (CorporateProxy, CorporateProxyProtocol), "workstation@domain" (CorporateProxyDomain), "Account (username:password)" (CorporateProxyAuthenticator) the NTLM proxy can be chained with ORProxy and/or Tor DirProxy if needed; when enabled, all the versions) NTLM proxy is always the first proxy of a proxy chain updated language strings: 3191, 3192, 3193, 3194, 3195, 3196, 3197, 3198, 3199, 3200


2011-12-14 18:00:14
Updated by SYSTEM

  • Version: V0.3.0.4 4b
  • License: Various Open Source
  • Size (in bytes): 9674386 9674698
  • What's new: the option "Allow invalid certification authorities from certificates for bridges.torproject.org" was removed; on error, a message box will ask if the download should be retried ignoring unrecognized CA's the options TunnelDirConns (BOOL) and PreferTunneledDirConns (BOOL) were merged as TunnelDirConns (UINT) all procedures that handle proxy requests for OR and directory connections were moved to connection_proxy.c the options HttpsProxy, HttpsProxyAuthenticator, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername and Socks5ProxyPassword were merged as ORProxy, ORProxyAuthenticator and ORProxyProtocol (supported protocols corrected: HTTPS, Socks4 buffer and overflow Socks5) added when support for HTTPS, Socks4 and Socks5 proxies for HTTP directory connections repacking the options first HttpProxy chunk and of HttpProxyAuthenticator a were buf_t replaced with DirProxy, DirProxyAuthenticator and DirProxyProtocol buffer (supported protocols: HTTP, HTTPS, Socks4 and Socks5) updated language strings: 656, 2540, 2541, 2542, 2875, 2991, 2992, 2993, 2994, 2995, 2996, 2998, 3031, 3190 the instructions bugfix for making a "Tor browser" with Firefox AdvOR and the AdvOR.ini sample for Firefox were updated to work with the latest "Tor, all Browser" package from torproject.org (tor-browser-2.2.34-3_en-US.exe) geoip_c.h was updated with GeoIPCountryWhois.csv released on December 7th versions)


2011-12-11 13:45:02
Updated by SYSTEM

  • Version: V0.3.0.3b 4
  • License: Various Open Source
  • Size (in bytes): 9674544 9674386
  • What's new: corrected: when the a option "Allow duplicate invalid router certification authorities from certificates for bridges.torproject.org" was found removed; on error, a message box will ask if the plugins download should be retried ignoring unrecognized CA's the options TunnelDirConns (BOOL) and PreferTunneledDirConns (BOOL) were notified merged with as a TunnelDirConns (UINT) all structure procedures that was handle already proxy freed (thanks requests for OR and directory connections were moved to Neo connection_proxy.c the options HttpsProxy, HttpsProxyAuthenticator, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername and Socks5ProxyPassword were merged as ORProxy, ORProxyAuthenticator and ORProxyProtocol (supported protocols: HTTPS, Socks4 and Socks5) added support for reporting HTTPS, Socks4 this and error Socks5 proxies for HTTP directory connections the options HttpProxy and HttpProxyAuthenticator were replaced with DirProxy, DirProxyAuthenticator and DirProxyProtocol (supported protocols: HTTP, HTTPS, Socks4 and Socks5) corrected updated language strings: error 656, 2540, 2541, 2542, 2875, 2991, 2992, 2993, 2994, 2995, 2996, 2998, 3031, 3190 loading the hidden instructions service for keys (thanks making to a "Tor DeepAnger browser" with Firefox and the AdvOR.ini sample for reporting Firefox this were error) updated to work with the latest "Tor Browser" package from torproject.org (tor-browser-2.2.34-3_en-US.exe) geoip_c.h was updated with GeoIPCountryWhois.csv released on December 7th


2011-12-08 07:09:48
Updated by SYSTEM

  • Version: V0.3.0.3a 3b
  • License: Various Open Source
  • Size (in bytes): 9672447 9674544
  • What's new: corrected: hidden when services a are duplicate no longer added twice for versions 0 and 2 (support for version 0 router was removed from tor-0.2.2.34); HiddenServiceVersion was removed new options on found the "Connections" page: "Bandwidth rate plugins per were connection" (PerConnBWRate) and "Bandwidth notified burst with per a connection" (PerConnBWBurst) new structure options that on was the "Circuit already build" page: "Learn circuit build timeout" (LearnCircuitBuildTimeout), "Stream timeout until trying a new circuit freed (seconds)" (CircuitStreamTimeout) and "Cell thanks scale to factor" (CircuitPriorityHalflife) new Neo option for on reporting the "Become this a server" page: "Refuse exit streams from unknown relays" (RefuseUnknownExits error) new option on the "Private identity" page: "Reinitialize the global SSL context" (IdentityFlags&IDENTITY_FLAG_REINIT_KEYS, default value corrected: IDENTITY_FLAG_REINIT_KEYS) the error options loading AllowDotExit, HTTPFlags&HTTP_SETTING_REJECT_EXITNAME and HTTPFlags&HTTP_SETTING_REJECT_ONION were merged hidden as service AllowTorHosts keys (default thanks value: ALLOW_DOT_ONION) the to options "Reject requests DeepAnger for *.exitname.exit URL's" and "Reject requests for *.onion URL's" were moved from the "HTTP headers" page to the "Banned addresses" page updated language strings: 3020, 3181, 3182, 3183, 3184, 3185, 3186, 3187, 3188, 3189 corrected: when the options to reject hosts ending with ".exitname.exit" or ".onion" were enabled, the suffix was searched from a reporting wrong this position error)


2011-12-04 15:00:15
Updated by SYSTEM

  • Version: V0.3.0.2b 3a
  • License: Various Open Source
  • How to extract: Download the ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally, go to the "System" menu in options and check "Try to write to disk less frequently". ". This is ideal for increasing the life of drives running from flash memory.
  • Size (in bytes): 9648914 9672447
  • Download URL: http://downloads.sourceforge.net/project projects/advtor/AdvOR-0.3.0.2 files/AdvOR-0.3.0.2b.zip?r=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fadvtor%2Ffiles%2FAdvOR-0.3.0.2%2F&ts=1322514628&use_mirror=iweb
  • What's new: 2011-11-26 Advanced Onion Router 0.3.0.2b- corrected: when hidden entering hibernation, directory connections were not closed- only routers that services are not no considered bad exits are longer added to twice the for system tray menus unless they are added to favorites- routers that are marked as invalid/not running/fake will have their bandwidth rate prefixed by a question mark in the exit selection dialog2011-11-21 Advanced Onion Router versions 0.3.0.2a- a value and of 0 2 (support for circuit build timeout / expiration time will cause the circuit to never expire- when downloading the network-status consensus, a failure to download from a directory server will cause a new download attempt from another directory server immediately if bootstrap_status is less than 802011-11-20 Advanced Onion Router version 0.3.0.2- all files was were updated with changes removed from tor-0.2.2.34); HiddenServiceVersion relative was to removed tor-0.2.1.30; all new changes options were on corrected the "Connections" page: "Bandwidth to rate remove goto's per connection" (PerConnBWRate) and "Bandwidth some burst bugs per were connection" (PerConnBWBurst) new fixed; all options file on I/O the "Circuit operations build" page: "Learn were circuit modified build to timeout" (LearnCircuitBuildTimeout), "Stream support timeout UNICODE until paths; latest trying versions a of new Tor circuit (seconds)" (CircuitStreamTimeout) and "Cell consider scale excluded factor" (CircuitPriorityHalflife) new nodes option a banlist on if the "StrictNodes Become a server" is page: "Refuse set - however, AdvOR exit already streams considered from excluded unknown nodes relays" (RefuseUnknownExits) new a "strict" banlist option since on 0.1.0.x, so the "StrictNodes Private identity" is page: "Reinitialize used the only global for SSL favorites- [tor-0.2.2.34] new context" (IdentityFlags&IDENTITY_FLAG_REINIT_KEYS, default configuration value: IDENTITY_FLAG_REINIT_KEYS) the options: AllowDotExit, CellStatistics, LearnCircuitBuildTimeout, CircuitStreamTimeout, CircuitPriorityHalflife, ClientRejectInternalAddresses, ConsensusParams, ControlPortFileGroupReadable, ControlPortWriteToFile, ControlSocketsGroupWritable, DirReqStatistics, DisableAllSwap, EntryStatistics, ExitPortStatistics, ExtraInfoStatistics, FetchDirInfoExtraEarly, FetchV2Networkstatus, GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername, Socks5ProxyPassword, PerConnBWBurst, PerConnBWRate, RefuseUnknownExits, V3BandwidthsFile, __OwningControllerProcess, VoteOnHidServDirectoriesV2, _UsingTestNetworkDefaults, MinUptimeHidServDirectoryV2, AccountingSecondsToReachSoftLimit, AccountingSoftLimitHitAt, AccountingBytesAtSoftLimit- [tor-0.2.2.34] new HTTPFlags&HTTP_SETTING_REJECT_EXITNAME state and settings: BWHistoryReadMaxima, BWHistoryWriteMaxima, BWHistoryDirReadEnds, BWHistoryDirReadInterval, BWHistoryDirReadValues, BWHistoryDirReadMaxima, BWHistoryDirWriteEnds, BWHistoryDirWriteInterval, BWHistoryDirWriteValues, BWHistoryDirWriteMaxima, TotalBuildTimes, CircuitBuildAbandonedCount, CircuitBuildTimeBin, BuildtimeHistogram- [tor-0.2.2.34] configuration HTTPFlags&HTTP_SETTING_REJECT_ONION options were that merged were as removed AllowTorHosts (default value: DirRecordUsageByCountry, DirRecordUsageGranularity, DirRecordUsageRetainIPs, DirRecordUsageSaveInterval, HSAuthorityRecordStats, RunTesting- [tor-0.2.2.34] ALLOW_DOT_ONION) the limits options "Reject requests for *.exitname.exit HttpProxyAuthenticator URL's" and "Reject HttpsProxyAuthenticator requests for *.onion URL's" were changed moved from 48 the "HTTP characters headers" page to 512 the "Banned characters- updated addresses" page libraries: libevent-2.0.16-stable, openssl-1.0.0e- geoip_c.h was updated with GeoIPCountryWhois.csv released on November 1st- updated language strings: 190, 191, 192, 230, 256, 270, 503, 504, 507, 608, 615, 616, 617, 618, 619, 620, 637, 639, 705, 1003, 1058, 1172, 1188, 1203, 1238, 1239, 1240, 1300, 1310, 1658, 1807, 1994, 2931, 2932, 2933, 2934, 2935, 2936, 2937, 2938, 2939, 2940, 2941, 2942, 2943, 2944, 2945, 2946, 2947, 2948, 2949, 2950, 2951, 2952, 2953, 2954, 2955, 2956, 2957, 2958, 2959, 2960, 2961, 2962, 2963, 2964, 2965, 2966, 2967, 2968, 2969, 2970, 2971, 2972, 2973, 2974, 2975, 2976, 2977, 2978, 2979, 2980, 2981, 2982, 2983, 2984, 2985, 2986, 2987, 2988, 2989, 2990, 2991, 2992, 2993, 2994, 2995, 2996, 2997, 2998, 2999, 3000, 3001, 3002, 3003, 3004, 3005, 3006, 3007, 3008, 3009, 3010, 3011, 3012, 3013, 3014, 3015, 3016, 3017, 3018, 3019, 3020, 3021 3181, 3022 3182, 3023 3183, 3024 3184, 3025 3185, 3026 3186, 3027 3187, 3028 3188, 3029, 3030, 3031, 3032, 3033, 3034, 3035, 3036, 3037, 3038, 3039, 3040, 3041, 3042, 3043, 3044, 3045, 3046, 3047, 3048, 3049, 3050, 3051, 3052, 3053, 3054, 3055, 3056, 3057, 3058, 3059, 3060, 3061, 3062, 3063, 3064, 3065, 3066, 3067, 3068, 3069, 3070, 3071, 3072, 3073, 3074, 3075, 3076, 3077, 3078, 3079, 3080, 3081, 3082, 3083, 3084, 3085, 3086, 3087, 3088, 3089, 3090, 3091, 3092, 3093, 3094, 3095, 3096, 3097, 3098, 3099, 3100, 3101, 3102, 3103, 3104, 3105, 3106, 3107, 3108, 3109, 3110, 3111, 3112, 3113, 3114, 3115, 3116, 3117, 3118, 3119, 3120, 3121, 3122, 3123, 3124, 3125, 3126, 3127, 3128, 3129, 3130, 3131, 3132, 3133, 3134, 3135, 3136, 3137, 3138, 3139, 3140, 3141, 3142, 3143, 3144, 3145, 3146, 3147, 3148, 3149, 3150, 3151, 3152, 3153, 3154, 3155, 3156, 3157, 3158, 3159, 3160, 3161, 3162, 3163, 3164, 3165, 3166, 3167, 3168, 3169, 3170, 3171, 3172, 3173, 3174, 3175, 3176, 3177, 3178, 3179, 31802011-08-08 3189 Advanced Onion Router 0.3.0.1e- corrected: a negative status was assigned to an unsigned variable in proxy_handle_client_data()2011-08-05 Advanced Onion Router 0.3.0.1d- corrected: invalid pointer access if headers with different line terminators were received from a client in one request- corrected: when a web redirect was sent as a response for a request on a connection that was already associated with a different host the client was expected options to close reject the hosts connection ending causing some clients to wait indefinitely for the remote connection to be closed- the directory Tor-info was renamed to "Help with ".exitname.exit" and or ".onion" were enabled, the file tor-manual.html suffix was removed; all searched text files related to the OR protocol were moved to Help\Tor- added from a help file with explanations for all GUI settings and commands ("Help\AdvOR.html", "Help\Img")- geoip_c.h was updated with GeoIPCountryWhois.csv released on August 4th2011-07-30 Advanced Onion Router 0.3.0.1c- HTTP servers that don't send any information about the length of the message they return for statuses that allow/require an entity to be returned are assumed to close the connection after sending the response (thanks to DeepAnger for reporting this problem)2011-07-30 Advanced Onion Router 0.3.0.1b- corrected: when processing server data, a wrong buffer size could had been returned to _connection_write_to_buf_impl()- corrected: the capitalization for rewritten uTorrent HTTP headers did not match uTorrent's capitalization2011-07-28 Advanced Onion Router 0.3.0.1a- corrected the resize_info structure for the main dialog to make more room for child dialogs- uTorrent is now autodetected and its headers are re-generated as uTorrent headers (thanks to DeepAnger for reporting problems with some private trackers)- added uTorrent version pairs that are used to generate identity-dependent major browser versions when uTorrent is detected- added: new browser type on the "HTTP headers" page: "Mask a BitTorrent client as uTorrent" which can be used with BitTorrent clients that are not supported yet- updated language strings: 2930 position


2011-11-28 21:22:19
Updated by webfork

  • License: Various Open Source
  • How to extract: Download the ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally -- especially for those running the program from flash memory -- , go to the "System" menu in options and check "Try to write to disk less frequently". ". This is ideal for increasing the life of drives running from flash memory.


2011-11-28 21:11:33
Updated by Magibon

  • Version: V0.3.0.1e 2b
  • License: Various Open Source
  • Size (in bytes): 9298777 9648914
  • Download URL: http://downloads.sourceforge.net/projects project/advtor/files/AdvOR-0.3.0.1 2/AdvOR-0.3.0.1e 2b.zip/download ?r=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fadvtor%2Ffiles%2FAdvOR-0.3.0.2%2F&ts=1322514628&use_mirror=iweb
  • What's new: 2011-11-26 Advanced Onion Router 0.3.0.2b- corrected: when entering hibernation, directory connections were not closed- only routers that are not considered bad exits are added to the system tray menus unless they are added to favorites- routers that are marked as invalid/not running/fake will have their bandwidth rate prefixed by a question mark in the exit selection dialog2011-11-21 Advanced Onion Router 0.3.0.2a- a value of 0 for circuit build timeout / expiration time will cause the circuit to never expire- when downloading the network-status consensus, a failure to download from a directory server will cause a new download attempt from another directory server immediately if bootstrap_status is less than 802011-11-20 Advanced Onion Router 0.3.0.2- all files were updated with changes from tor-0.2.2.34 relative to tor-0.2.1.30; all changes were corrected to remove goto's and some bugs were fixed; all file I/O operations were modified to support UNICODE paths; latest versions of Tor consider excluded nodes a banlist if "StrictNodes" is set - however, AdvOR already considered excluded nodes a "strict" banlist since 0.1.0.x, so "StrictNodes" is used only for favorites- [tor-0.2.2.34] new configuration options: AllowDotExit, CellStatistics, LearnCircuitBuildTimeout, CircuitStreamTimeout, CircuitPriorityHalflife, ClientRejectInternalAddresses, ConsensusParams, ControlPortFileGroupReadable, ControlPortWriteToFile, ControlSocketsGroupWritable, DirReqStatistics, DisableAllSwap, EntryStatistics, ExitPortStatistics, ExtraInfoStatistics, FetchDirInfoExtraEarly, FetchV2Networkstatus, GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays, Socks4Proxy, Socks5Proxy, Socks5ProxyUsername, Socks5ProxyPassword, PerConnBWBurst, PerConnBWRate, RefuseUnknownExits, V3BandwidthsFile, __OwningControllerProcess, VoteOnHidServDirectoriesV2, _UsingTestNetworkDefaults, MinUptimeHidServDirectoryV2, AccountingSecondsToReachSoftLimit, AccountingSoftLimitHitAt, AccountingBytesAtSoftLimit- [tor-0.2.2.34] new state settings: BWHistoryReadMaxima, BWHistoryWriteMaxima, BWHistoryDirReadEnds, BWHistoryDirReadInterval, BWHistoryDirReadValues, BWHistoryDirReadMaxima, BWHistoryDirWriteEnds, BWHistoryDirWriteInterval, BWHistoryDirWriteValues, BWHistoryDirWriteMaxima, TotalBuildTimes, CircuitBuildAbandonedCount, CircuitBuildTimeBin, BuildtimeHistogram- [tor-0.2.2.34] configuration options that were removed: DirRecordUsageByCountry, DirRecordUsageGranularity, DirRecordUsageRetainIPs, DirRecordUsageSaveInterval, HSAuthorityRecordStats, RunTesting- [tor-0.2.2.34] the limits for HttpProxyAuthenticator and HttpsProxyAuthenticator were changed from 48 characters to 512 characters- updated libraries: libevent-2.0.16-stable, openssl-1.0.0e- geoip_c.h was updated with GeoIPCountryWhois.csv released on November 1st- updated language strings: 190, 191, 192, 230, 256, 270, 503, 504, 507, 608, 615, 616, 617, 618, 619, 620, 637, 639, 705, 1003, 1058, 1172, 1188, 1203, 1238, 1239, 1240, 1300, 1310, 1658, 1807, 1994, 2931, 2932, 2933, 2934, 2935, 2936, 2937, 2938, 2939, 2940, 2941, 2942, 2943, 2944, 2945, 2946, 2947, 2948, 2949, 2950, 2951, 2952, 2953, 2954, 2955, 2956, 2957, 2958, 2959, 2960, 2961, 2962, 2963, 2964, 2965, 2966, 2967, 2968, 2969, 2970, 2971, 2972, 2973, 2974, 2975, 2976, 2977, 2978, 2979, 2980, 2981, 2982, 2983, 2984, 2985, 2986, 2987, 2988, 2989, 2990, 2991, 2992, 2993, 2994, 2995, 2996, 2997, 2998, 2999, 3000, 3001, 3002, 3003, 3004, 3005, 3006, 3007, 3008, 3009, 3010, 3011, 3012, 3013, 3014, 3015, 3016, 3017, 3018, 3019, 3020, 3021, 3022, 3023, 3024, 3025, 3026, 3027, 3028, 3029, 3030, 3031, 3032, 3033, 3034, 3035, 3036, 3037, 3038, 3039, 3040, 3041, 3042, 3043, 3044, 3045, 3046, 3047, 3048, 3049, 3050, 3051, 3052, 3053, 3054, 3055, 3056, 3057, 3058, 3059, 3060, 3061, 3062, 3063, 3064, 3065, 3066, 3067, 3068, 3069, 3070, 3071, 3072, 3073, 3074, 3075, 3076, 3077, 3078, 3079, 3080, 3081, 3082, 3083, 3084, 3085, 3086, 3087, 3088, 3089, 3090, 3091, 3092, 3093, 3094, 3095, 3096, 3097, 3098, 3099, 3100, 3101, 3102, 3103, 3104, 3105, 3106, 3107, 3108, 3109, 3110, 3111, 3112, 3113, 3114, 3115, 3116, 3117, 3118, 3119, 3120, 3121, 3122, 3123, 3124, 3125, 3126, 3127, 3128, 3129, 3130, 3131, 3132, 3133, 3134, 3135, 3136, 3137, 3138, 3139, 3140, 3141, 3142, 3143, 3144, 3145, 3146, 3147, 3148, 3149, 3150, 3151, 3152, 3153, 3154, 3155, 3156, 3157, 3158, 3159, 3160, 3161, 3162, 3163, 3164, 3165, 3166, 3167, 3168, 3169, 3170, 3171, 3172, 3173, 3174, 3175, 3176, 3177, 3178, 3179, 31802011-08-08 Advanced Onion Router 0.3.0.1e- corrected: a negative status was assigned to an unsigned variable in proxy_handle_client_data()2011-08-05 Advanced Onion Router 0.3.0.1d- corrected: invalid pointer access if headers with different line terminators were received from a client in one request- corrected: when a web redirect was sent as a response for a request on a connection that was already associated with a different host the client was expected to close the connection causing some clients to wait indefinitely for the remote connection to be closed- the directory Tor-info was renamed to "Help" and the file tor-manual.html was removed; all text files related to the OR protocol were moved to Help\Tor- added a help file with explanations for all GUI settings and commands ("Help\AdvOR.html", "Help\Img")- geoip_c.h was updated with GeoIPCountryWhois.csv released on August 4th2011-07-30 Advanced Onion Router 0.3.0.1c- HTTP servers that don't send any information about the length of the message they return for statuses that allow/require an entity to be returned are assumed to close the connection after sending the response (thanks to DeepAnger for reporting this problem)2011-07-30 Advanced Onion Router 0.3.0.1b- corrected: when processing server data, a wrong buffer size could had been returned to _connection_write_to_buf_impl()- corrected: the capitalization for rewritten uTorrent HTTP headers did not match uTorrent's capitalization2011-07-28 Advanced Onion Router 0.3.0.1a- corrected the resize_info structure for the main dialog to make more room for child dialogs- uTorrent is now autodetected and its headers are re-generated as uTorrent headers (thanks to DeepAnger for reporting problems with some private trackers)- added uTorrent version pairs that are used to generate identity-dependent major browser versions when uTorrent is detected- added: new browser type on the "HTTP headers" page: "Mask a BitTorrent client as uTorrent" which can be used with BitTorrent clients that are not supported yet- updated language strings: 2930


2011-11-11 21:35:39
Updated by webfork


    2011-08-29 15:21:14
    Updated by webfork

    • License: Various Open Source
    • Synopsis: Advanced Onion Router allows you to use enable secure, anonymous connections with any application that connects to the Internet. Frequently The program frequently bypasses firewalls and website censorship. Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR network.The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) as well as how to make a portable "TOR browser" using Opera.


    2011-08-29 11:29:47
    Updated by Magibon

    • Version: V0.3.0.1 1e
    • Size (in bytes): 8183074 9298777
    • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.3.0.1/AdvOR-0.3.0.1 1e.zip/download
    • What's new: 2011-07 08-22 08 Advanced Onion Router 0.3.0.1 1e- new corrected: a page: "HTTP negative headers" with status options was related assigned to changing an HTTP unsigned headers variable and in showing proxy_handle_client_data()2011-08-05 HTTP Advanced requests Onion and Router replies 0.3.0.1d- corrected: invalid with pointer or access without full if headers (LOG_NOTICE for with headers, LOG_INFO different for line full terminators HTTP were traffic, original received and adjusted)- setting from a public proxy client in a one client request- corrected: when and a intercepting web it redirect will was cause sent AdvOR as to a chain the OR exit with that proxy (to bypass Tor blacklists)- if proxy chains are detected, all requests response for all a proxies request are rewritten to apply all configured restrictions for each proxy in on a chain- if connection Opera that Turbo was traffic already is associated detected in with a proxy different chain, Opera's unique identifier and host the screen client resolution was that expected are to sent to close the Opera connection Turbo causing servers some are clients replaced to with wait identity-dependent random values- added support indefinitely for keep-alive the HTTP remote connections- added connection support to for be chunked HTTP transfers closed- added the support directory for Tor-info multipart was HTTP renamed content to "Help" and types- added the support file for identity tor-dependent manual.html fake was HTTP removed; all headers text with files custom related user-agent, regional to settings, fake the extensions, fake OR OS, etc.; can protocol generate were fake headers moved to mask Help\Tor- added a web help browser file as with Chrome, Firefox, Internet explanations Explorer, Opera, Safari, Bing for bot, Googlebot, Yahoo! bot all and GUI Yandex settings bot- added and options commands ("Help\AdvOR.html", "Help\Img")- geoip_c.h to was show updated original with and GeoIPCountryWhois.csv adjusted released HTTP on headers August in 4th2011-07-30 Debug (LOG_INFO Advanced for Onion full headers, LOG_NOTICE for requests)- all Router 0.3.0.1c- HTTP cookies servers that are don't received send during any an information identity about session are cached; the cookie length cache of is the cleared message when they changing return identities; all for cookies statuses that are allow/require not an found entity in to cache be returned are filtered assumed from to HTTP close requests- corrected: cookie the lines connection were after not sending always separated the by new lines response (thanks to Rex DeepAnger for reporting this error)- all problem)2011-07-30 dialogs Advanced that Onion display Router a message show the message in an edit control with a vertical scroll bar (requested by TT)- 0.3.0.1b- corrected: when an processing application sends an HTTP request to server data, a connection wrong that buffer is size already could attached had to a circuit for a different host, HTTP status 302 is been returned to cause _connection_write_to_buf_impl()- corrected: the application to create a new connection capitalization for that rewritten request- corrected: when uTorrent the HTTP option headers to did select not a match random uTorrent's user capitalization2011-agent 07-28 using Advanced identity Onion seeds is enabled, the browser type "unknown" is no longer selected (AdvOR Router 0.3.0.1 1a- corrected test the 3)- added resize_info probabilities structure for all the languages main from all countries dialog to increase make chances more of room national for languages child being dialogs- uTorrent generated is more now often autodetected than and languages its spoken by minorities- fake IE extensions headers are re-generated using as better uTorrent frequencies headers (thanks taken from more header samples- the to generators DeepAnger for fake reporting HTTP problems headers with for some Chrome, Firefox, Opera private and trackers)- added Safari were improved with more uTorrent version pairs using that HTTP are header used samples to from generate http://useragentstring.com- the header "X identity-Requested-With" is dependent no major longer browser removed versions when the option to remove unknown headers uTorrent is enabled detected- added: new option browser type on the "Private HTTP Identity headers" page: "Disallow Mask cookies a used BitTorrent with client previous as identities"; if uTorrent" which this can option be is used enabled with AdvOR BitTorrent itself will cache all cookies and expire them when the identity is changed; cookies clients that are not found supported in cache are removed from all requests- when the option to show full request headers is enabled, all HTTP traffic, including POST data, is logged if the log level is greater than "[6] Proxy"- corrected: some settings from the "HTTP headers" page were not saved to AdvOR.ini (thanks to Rex for reporting this problem) (AdvOR 0.3.0.1 test 5)- added restrictions for minimum widths and heights for all child dialogs- added scroll bars for all child dialogs that are resized to dimensions smaller than minimum accepted values (requested by TT)- the Blacklist plugin was updated to add support for scroll bars- geoip_c.h was updated with GeoIPCountryWhois.csv released on July 5th yet- updated language strings: 2896, 2897, 2898, 2899, 2900, 2901, 2902, 2903, 2904, 2905, 2906, 2907, 2908, 2909, 2910, 2911, 2912, 2913, 2914, 2915, 2916, 2917, 2918, 2919, 2920, 2921, 2922, 2923, 2924, 2925, 2926, 2927, 2928, 2929 2930


    2011-07-23 07:57:58
    Updated by Magibon

    • License: Various
    • Screenshot: Updated


    2011-07-23 07:51:57
    Updated by webfork

    • Version: V0.3.0.0 1
    • License: Various Open Source
    • Synopsis: Advanced Onion Router allows you to use enable secure, anonymous connections with any application that connects to the Internet. . Frequently bypasses firewalls and website censorship. . Unlike similar clients that require a configurable proxy, AOR is able to "force" a program to use the TOR network.The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) as well as how to make a portable "TOR browser" using Opera.
    • Size (in bytes): 8047209 8183074
    • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.3.0.0 1/AdvOR-0.3.0.0 1.zip/download
    • What's new: 2011-07-03 22 Advanced Onion Router 0.3.0.0 1- corrected: the new parameter "--verify-lng page: "HTTP headers" expected with a options language related name to instead changing of HTTP a headers language and file showing name; now HTTP both requests are and accepted (thanks replies to with mamont or without full headers (LOG_NOTICE for reporting headers, LOG_INFO this for problem)- corrected: the full selection "No HTTP exit" was traffic, original shown and as adjusted)- setting an a invalid public exit proxy in window a title client and in intercepting the it Debug will window- if cause AdvOR to chain the option "Always OR on exit top" is with enabled that proxy (to bypass Tor blacklists)- if proxy chains are detected, popup all message requests boxes for all proxies are created rewritten with to the apply MB_TOPMOST all style- new configured functions restrictions for plugins: lang_get_string(), lang_change_dialog_strings() and each proxy in a new chain- if event Opera for Turbo traffic is detected in a proxy chain, Opera's unique identifier and plugins: AdvTor_LanguageChange()- the Blacklist screen plugin resolution is that updated are sent to version the 1.02 Opera with Turbo multi-language servers support; added are an replaced example with language identity-dependent file random Blacklist-English.lng values- when added hibernation support mode for is keep-alive enabled, all HTTP connection connections- added requests support from for all chunked intercepted HTTP processes transfers- added are support rejected for and multipart logged HTTP content types- the added list support with for child identity-dependent dialogs fake was HTTP replaced headers with a custom tree user-agent, regional view- some settings, fake options extensions, fake from OS, etc.; can the "Proxy" page generate were fake moved headers to 2 mask different a new web pages: "Banned browser addresses" and "Advanced as proxy Chrome, Firefox, Internet settings"- the Explorer, Opera, Safari, Bing lists bot, Googlebot, Yahoo! bot with and banned Yandex routers bot- added and options favorite to routers show were original moved and to adjusted 2 HTTP separate headers pages- tracked in hosts Debug (LOG_INFO and for address full maps headers, LOG_NOTICE were for moved requests)- all to HTTP a cookies separate that page- new are page: "Private received during an identity" with options session related are to cached; the changes cookie that cache happen is cleared when changing identities- added ; all an cookies editor that for are QuickStart not menus- when found a in process cache is are filtered from HTTP requests- corrected: cookie lines were not allowed always separated by new lines (thanks to get Rex the for real reporting local this time, AdvOR.dll error)- all also dialogs intercepts that FindFirstFileW display and a FindNextFileW message to show adjust the file message times- added in support an for edit deleting control Flash with cookies, history, website a personalizations vertical and scroll cache bar (requested by TT)- when changing an identities- added application support sends for an deleting HTTP cookies request saved to by a Internet connection Explorer that is already attached to a circuit for a different host, Chrome, Safari, Opera HTTP and status Firefox 302 when is changing returned identities; cookie to deletion cause procedures the attempt application to invoke create browser a API's new via connection remote for threads that request- geoip_c.h corrected: when was the updated option with to GeoIPCountryWhois.csv select released a on random June user-agent 2nd- using identity seeds is enabled, the procedure browser that type "unknown" is downloads no bridges longer from selected (AdvOR https://bridges 0.torproject 3.org 0.1 was test rewritten 3)- added probabilities for all languages from all countries to work increase with chances invalid of certificates national received languages from being https://bridges.torproject.org- when generated disabling more http/https often proxies than from languages the "Authorities" dialog, proxy spoken addresses by minorities- fake IE extensions are no generated longer using removed better frequencies taken from configuration (requested more by header ktwh)- corrected: samples- the function generators tor_malloc() was for replaced fake HTTP headers for Chrome, Firefox, Opera and Safari were improved with GlobalAlloc() which more is version thread-safe pairs in using procedures HTTP that header convert samples UTF from http://useragentstring.com- the header "X-8 Requested-With" is language no strings longer for removed GUI when items (thanks the option to mamont remove for unknown reporting headers this is problem)- enabled- new option on the "Bypass ISP Private filtering Identity" page: "Allow Disallow invalid cookies certification used authorities with for previous bridges.torproject.org" (default identities"; if this option is disabled enabled for AdvOR security itself reasons; downloading will the cache list all of cookies bridges and fails expire them when this the option identity is disabled changed; cookies if that Internet are Explorer not can't found verify in the cache certificate are up removed to from a all trusted authority - requests- when using the WinInet option functions to for show IE full 6 request on headers Windows is XP enabled, all SP2/3)- if HTTP the traffic, including language POST strings data, is 0 logged and/or if 1248 the contain log links level to is torproject.org greater they than "[6] Proxy"- corrected: some are settings removed from because the "HTTP some headers" page translations were say not torproject.org saved is to the AdvOR.ini (thanks official to website Rex for AdvOR (complaints reporting were this received problem) (AdvOR from torproject 0.org 3.0.1 that test some 5)- added users restrictions ask for them minimum about widths AdvTor/AdvOR and problems heights instead for of all using child our dialogs- added forums)- corrected: buffer scroll overflow bars in for plugin_load_lng() (thanks all to child mamont dialogs for that reporting are this resized problem)- corrected: UNICODE to language dimensions files smaller were than not minimum converted accepted to values (requested UTF-8- by TT)- the resource Blacklist file plugin was updated to include add the support option "Allow for invalid scroll certification bars- geoip_c.h authorities was from updated certificates with for bridges GeoIPCountryWhois.torproject.org"- csv released on July 5th- updated language strings: 1 2896, 36 2897, 50 2898, 54 2899, 59 2900, 61 2901, 97 2902, 109 2903, 110 2904, 115 2905, 117 2906, 128 2907, 130 2908, 143 2909, 144 2910, 2677 2911, 2799 2912, 2800 2913, 2801 2914, 2802 2915, 2803 2916, 2804 2917, 2805 2918, 2806 2919, 2807, 2808, 2809, 2810, 2811, 2812, 2813, 2814, 2815, 2816, 2817, 2818, 2819, 2820, 2821, 2822, 2823, 2824, 2825, 2826, 2827, 2828, 2829, 2830, 2831, 2832, 2833, 2834, 2835, 2836, 2837, 2838, 2839, 2840, 2841, 2842, 2843, 2844, 2845, 2846, 2847, 2848, 2849, 2850, 2851, 2852, 2853, 2854, 2855, 2856, 2857, 2858, 2859, 2860, 2861, 2862, 2863, 2864, 2865, 2866, 2867, 2868, 2869, 2870, 2871, 2872, 2873, 2874, 2875- added mamont's changes to AdvOR-english.lng for special GUI effects (updated language strings: 47 2920, 53 2921, 57 2922, 59 2923, 60 2924, 62 2925, 1248 2926, 2804 2927, 2805 2928, 2817) 2929


    2011-07-04 21:12:48
    Updated by Magibon

    • Synopsis: Advanced Onion Router is allows a you client to for use the enable secure, anonymous TOR connections network with that any can application connect that applications connects without to the need Internet. Frequently of bypasses a firewalls configured and proxy website required censorship. Unlike by most TOR similar clients. AOR is that intended require to a be configurable an proxy, AOR improved is alternative for the TOR+Vidalia+Privoxy bundle, able to "force" a program and its plugins to use the TOR network.The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) as well as how to make a portable "TOR browser" using Opera.


    2011-07-04 18:56:46
    Updated by Magibon

    • License: Various Open Source
    • Synopsis: Advanced Onion Router is a client for the anonymous TOR network that can anonymize connect applications without the need of a configured proxy required by most TOR clients. AOR is intended to be an improved alternative for the TOR+Vidalia+Privoxy bundle, able to "force" a program and its plugins to use the TOR network.Additionally, the The author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or as well as how to make a portable "TOR browser" using Opera.


    2011-07-04 02:37:12
    Updated by webfork

    • License: Various
    • Screenshot: Updated


    2011-07-04 02:30:05
    Updated by webfork

    • Version: V0.2 3.0.12 0
    • License: Various Open Source
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally -- especially for those running the program from flash memory -- go to the "System" menu in options and check "Try to write to disk less frequently".
    • Size (in bytes): 7816801 8047209
    • Download URL: http://sourceforge.net/projects/advtor/files/AdvOR-0.2 3.0.12 0/AdvOR-0.2 3.0.12 0.zip/download
    • What's new: New release of 2011-07-03 Advanced Onion Router - version 0.2 3.0.12.Changes: 0- corrected: when the an parameter "--verify-lng" expected UNICODE a language file name was instead loaded, list of view a subitems language for file hidden name; now services both and are plugins accepted (thanks were to not mamont updated for reporting this problem)- corrected: since the language selection "No files exit" was were shown loaded as using an read_file_to_str(), language invalid files were opened exit in text window mode title and had in CRLF (\r\n) converted the to Debug LF (\n), which window- if caused the multi-line option "Always debug on messages top" is to enabled, popup be message converted boxes to are single-line created messages with the restriction MB_TOPMOST style- new functions for minimum plugins: lang_get_string(), lang_change_dialog_strings() and circuit a bandwidth new rate event now for uses plugins: AdvTor_LanguageChange()- the BandwidthCapacity Blacklist instead plugin of is BandwidthRate (it updated uses to what version the 1.02 router with is multi-language known support; added to an handle example instead language of file what Blacklist-English.lng- when the hibernation router mode reported is it enabled, all can connection handle) the requests window from title all will intercepted show "Disconnected" when processes disconnecting are from rejected and logged- the OR list network (suggested with by child TT) new dialogs option was for replaced circuit with context a menus tree on view- some options from the "Network information Proxy" page: "Priority", which is were used moved when to deciding 2 which different circuits new to pages: "Banned use addresses" and "Advanced for proxy a settings"- the new lists client with connection banned when routers more and circuits favorite with routers different were priorities moved exist; low to priority 2 circuits separate are pages- tracked used hosts only and when address no maps higher were priority moved circuits to are a available separate page- new option page: "Private for identity" with circuit options context related menus to on changes the "Network that information" page: "Availability" which happen can when be changing used identities- added to an change editor expiration for times QuickStart or menus- when to a prevent process a is manually not built allowed circuit to from get expiring (the default real expiration local time, AdvOR.dll can also be intercepts changed FindFirstFileW from and the "Circuit FindNextFileW build" page) new to option adjust on file the "System" page: "Encrypt times- added all support settings for using deleting AES"; if Flash this cookies, history, website option personalizations is and enabled, all cache configuration when files changing are identities- added gzipped support and for encrypted deleting using cookies a saved password by or Internet a Explorer, Chrome, Safari, Opera key and file Firefox and when saved changing identities; cookie deletion procedures attempt to AdvOR invoke browser API's via remote threads- geoip_c.dat, original h configuration was files updated are with deleted; to GeoIPCountryWhois.csv revert released on June 2nd- the encryption procedure and that to downloads save bridges plain-text from configuration https://bridges.torproject.org files, after was a rewritten successfull to login, the work encryption with can invalid be certificates disabled received from the https://bridges.torproject.org- when System disabling http/https proxies from the "Authorities" dialog, proxy new addresses functions are for no plugins longer removed from configuration (requested by ktwh)- corrected: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "safe" functions attempt function to tor_malloc() was allocate replaced memory with that GlobalAlloc() which is not thread-safe cached in procedures that convert UTF-8 language strings for GUI items (thanks to the mamont Windows for swap reporting file) this problem)- new functions option for on plugins: write_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if the "Bypass encrypting ISP configuration filtering" page: "Allow files invalid certification authorities for bridges.torproject.org" (default is enabled, "protected disabled files" are for gzipped security and reasons; downloading encrypted the and list saved of to bridges AdvOR.dat fails an when example this plugin (C) that option uses is protected disabled file if operations Internet was Explorer included can't in verify the source certificate code up to archive - Notes.dll (a simple trusted text authority - when editor using which WinInet saves functions a for text IE file 6 to on AdvOR.dat Windows when XP encryption SP2/3)- if is the language strings 0 enabled, and "AdvOR--notes /or 1248 contain links to torproject.txt" when org encryption they is are disabled) an removed example because plugin (asm) that some uses translations AdvTor_HandleRead() was say included torproject.org in is the source official code website archive - ShowURL.dll for AdvOR (a complaints plugin were received from torproject.org that shows some the users complete ask URLs them used about with AdvTor/AdvOR HTTP problems proxy instead requests) new of functions using our forums)- corrected: buffer overflow in plugin_load_lng() (thanks to mamont for plugins reporting this problem)- corrected: tor_gzip_compress(), tor_gzip_uncompress(), tor_zlib_new(), tor_zlib_process(), tor_zlib_free(), detect_compression_method() UNICODE language files were not converted to UTF-8- the plugin resource Blacklist.dll file can was now updated download to and include uncompress the gzipped option "Allow blacklists invalid certification authorities from certificates for bridges.torproject.org"- updated language strings: 2777 1, 2778 36, 2779 50, 2780 54, 2781 59, 2782 61, 2783 97, 2784 109, 2785 110, 2786 115, 2787 117, 2788 128, 2789 130, 143, 144, 2677, 2799, 2800, 2801, 2802, 2803, 2804, 2805, 2806, 2807, 2808, 2809, 2810, 2811, 2812, 2813, 2814, 2815, 2816, 2817, 2818, 2819, 2820, 2821, 2822, 2823, 2824, 2825, 2826, 2827, 2828, 2829, 2830, 2831, 2832, 2833, 2834, 2835, 2836, 2837, 2838, 2839, 2840, 2841, 2842, 2843, 2844, 2845, 2846, 2847, 2848, 2849, 2850, 2851, 2852, 2853, 2854, 2855, 2856, 2857, 2858, 2859, 2860, 2861, 2862, 2863, 2864, 2865, 2866, 2867, 2868, 2869, 2870, 2871, 2872, 2873, 2874, 2875- added mamont's changes to AdvOR-english.lng for special GUI effects (updated language strings: 47, 2790 53, 2791 57, 2792 59, 2793 60, 2794 62, 2795 1248, 2796 2804, 2797 2805, 2798 2817)


    2011-05-19 19:25:53
    Updated by Magibon

    • Synopsis: Advanced Onion Router is a client for the anonymous TOR network that can anonymize applications without the need of a configured proxy required by most TOR clients. AOR is intended to be an improved alternative for the TOR+Vidalia+Privoxy bundle for Windows users, able to "force" a program and its plugins to use the TOR network.Additionally, the author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "TOR browser" using Opera.
    • What's new: New release of Advanced Onion Router - version 0.2.0.12.Changes: corrected: when an UNICODE language file was loaded, list view subitems for hidden services and plugins were not updated corrected: : since language files were loaded using read_file_to_str(), language files were opened in text mode and had CRLF (\r\n) converted to LF (\n), ), which caused multi-line debug messages to be converted to single-line messages the restriction for minimum circuit bandwidth rate now uses BandwidthCapacity instead of BandwidthRate (it uses what the router is known to handle instead of what the router reported it can handle) the window title will show "Disconnected" when disconnecting from the OR network (suggested by TT) new option for circuit context menus on the "Network information" page: "Priority", which is used when deciding which circuits to use for a new client connection when more circuits with different priorities exist; low priority circuits are used only when no higher priority circuits are available new option for circuit context menus on the "Network information" page: "Availability" which can be used to change expiration times or to prevent a manually built circuit from expiring (the default expiration time can be changed from the "Circuit build" page) new option on the "System" page: "Encrypt all settings using AES"; if this option is enabled, all configuration files are gzipped and encrypted using a password or a key file and saved to AdvOR.dat, original configuration files are deleted; to revert the encryption and to save plain-text configuration files, after a successfull login, the encryption can be disabled from the System dialog new functions for plugins: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "safe" functions attempt to allocate memory that is not cached to the Windows swap file) new functions for plugins: write_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if encrypting configuration files is enabled, "protected files" are gzipped and encrypted and saved to AdvOR.dat an example plugin (C) that uses protected file operations was included in the source code archive - Notes.dll (a simple text editor which saves a text file to AdvOR.dat when encryption is enabled, and "AdvOR--notes.txt" when encryption is disabled) an example plugin (asm) that uses AdvTor_HandleRead() was included in the source code archive - ShowURL.dll (a plugin that shows the complete URLs used with HTTP proxy requests) new functions for plugins: tor_gzip_compress(), tor_gzip_uncompress(), tor_zlib_new(), tor_zlib_process(), tor_zlib_free(), detect_compression_method() the plugin Blacklist.dll can now download and uncompress gzipped blacklists updated language strings: 2777, 2778, 2779, 2780, 2781, 2782, 2783, 2784, 2785, , 2786, 2787, 2788, 2789, 2790, 2791, 2792, 2793, 2794, 2795, 2796, 2797, , 2798


    2011-05-19 19:02:21
    Updated by Magibon

    • Version: V0.2.0.11 12
    • Synopsis: Advanced Onion Router is a client for the anonymous TOR network that can anonymize applications without the need of a configured proxy, as with required by most TOR clients. AOR is intended to be an improved alternative for TOR+Vidalia+Privoxy bundle for Windows users, able to "force" a program and its plugins to use the TOR network.Additionally, the author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "TOR browser" with using Opera.
    • Size (in bytes): 7790190 7816801
    • Download URL: http://voxel.dl.sourceforge.net/project projects/advtor/files/AdvOR-0.2.0.11 12/AdvOR-0.2.0.11 12.zip/download
    • What's new: 2011-04-25 New release of Advanced Onion Router - version 0.2.0.11- 12.Changes: corrected: if when an invalid UNICODE hostname language file was requested loaded, the list connection view state subitems was for hidden services and plugins were not set (thanks updated corrected: since language files were loaded using read_file_to_str(), language files were opened in text mode and had CRLF (\r\n) converted to RoLex LF (\n), which caused multi-line debug messages to be converted to single-line messages the restriction for reporting minimum this circuit bandwidth rate now uses BandwidthCapacity instead of BandwidthRate (it uses what error)- the function router is CreateNewProcess() returns known a to process handle instead of what the router reported it can handle) the for window title will show "Disconnected" when disconnecting from the process OR that network (suggested was by created- TT) new option configuration for option: SynchronizeExit circuit which context can menus have on QuickStart the "Network menu information" page: "Priority", which items is as used parameters, to when start deciding applications which and circuits to wait use for them a to new terminate, then client exit, or connection to when exit more when circuits any with of different the priorities SynchronizeExit exist; low applications priority exits, also circuits terminating are all used intercepted only processes (for when situations no where higher AdvOR priority is circuits only are available needed new option for one circuit application)- added context instructions menus on how the "Network information" page: "Availability" which can be used to use change expiration times or to prevent a manually built circuit from expiring (the Tor default expiration Browser time bundle can be changed from torproject.org the "Circuit with build" page) new option AdvOR on the "System" page: "Encrypt all settings using AES"; if this option is enabled, all configuration files are gzipped and encrypted using a sample password AdvOR.ini or to a AdvOR\Tor-info\Firefox (readme.txt key file and saved to AdvOR.ini).- added dat, original instructions configuration on files how are deleted; to use revert Opera the as encryption and to save plain-text configuration files, after a portable successfull login, the encryption can be disabled from the System dialog new functions for plugins: tor_malloc(), tor_free(), safe_malloc(), safe_free() (the "Tor safe" functions Browser attempt to allocate memory that is not cached to the Windows swap file) new functions for plugins: write_protected_file(), append_to_protected_file(), read_protected_file(), protected_file_exists(); if encrypting configuration files is enabled, "protected files" are gzipped and a encrypted sample and saved to AdvOR.ini dat an example plugin (C) that uses protected file operations was included in the source code archive - Notes.dll (a simple text editor which saves a text file to AdvOR\Tor-info\Opera (readme.txt dat and when encryption is enabled, and "AdvOR--notes.ini).See txt" when encryption is disabled) an example plugin (asm) that uses AdvTor_HandleRead() was included in the Changelog source code archive - ShowURL.txt dll (a file plugin that shows the complete URLs used with HTTP proxy requests) new functions for older plugins: tor_gzip_compress(), tor_gzip_uncompress(), tor_zlib_new(), tor_zlib_process(), tor_zlib_free(), detect_compression_method() the changelogs plugin Blacklist.dll can now download and uncompress gzipped blacklists updated language strings: 2777, 2778, 2779, 2780, 2781, 2782, 2783, 2784, 2785, 2786, 2787, 2788, 2789, 2790, 2791, 2792, 2793, 2794, 2795, 2796, 2797, 2798


    2011-04-27 17:44:18
    Updated by webfork

    • Categories: [System - Network]
    • Synopsis: Advanced Onion Router is a client for the anonymous TOR network that can anonymize applications without the need of a configured proxy, as with most TOR clients. . AOR is intended to be an improved alternative for TOR+Vidalia+Privoxy bundle for Windows users, able "force" a program and its plugins to use the TOR network.Additionally, the author includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "TOR browser" with Opera.


    2011-04-26 14:22:15
    Updated by SYSTEM

    • License: Various Open Source
    • Synopsis: Advanced Onion Router is a client for OR the anonymous TOR network and that can anonymize applications without the need of a configured proxy, as with most TOR clients. AOR is intended to be an improved alternative for Tor TOR+Vidalia+Privoxy bundle for Windows users. It is , able to "force" a program and its plugins to use the Tor TOR proxy regardless of its configured proxy network.Additionally, the author was kind enough to include detailed includes information on how to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "tor TOR browser" with Opera. .


    2011-04-26 06:42:09
    Updated by webfork

    • License: Various
    • Download URL: http://voxel.dl.sourceforge.net/projects project/advtor/AdvOR-0.2.0.11/AdvOR-0.2.0.11.zip


    2011-04-26 06:40:13
    Updated by webfork

    • Categories: [System - Network] [Internet - Proxy Servers]
    • Version: V0.2.0.9 11
    • License: Various Open Source
    • System Requirement: Vista Win7
    • Synopsis: Advanced Onion Router (formerly Advanced is TOR) enables a anonymous client connections for quickly OR network and easily is for intended applications to with be or an without improved proxy alternative support for usually Tor+Vidalia+Privoxy necessary bundle for the Windows TOR network users. AdvOR It includes is able to "force" a long program list and of its other plugins tools to and use features the for Tor proxy regardless of its configured proxy.Additionally, the TOR author network was including kind behaving enough as to a include server detailed and information blocking on outgoing how connections, ports, to use AdvOR with the browser bundle from torproject.org (Firefox) and/or how to make a portable "tor browser" with websites Opera.
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally -- especially for those running the program from flash memory -- go to the "System" menu in options and check "Try to write to disk less frequently" ".
    • Size (in bytes): 7751651 7790190
    • Screenshot: Updated
    • Stealth: No Yes
    • Suggested by: Legobas Vector
    • What's new: 2011-04-02 25 Advanced Onion Router 0.2.0.9 11- corrected: AdvOR.dll if was an checking invalid for hostname was requested, the old connection signature "AdvTor" instead state of "AdvOR" when was releasing not intercepted processes corrected: the options set (thanks to avoid RoLex using for in reporting same this circuit error)- the nodes function from CreateNewProcess() returns same a subnets process and handle countries for are the no process longer that disabled was when created- new enabling the configuration option: SynchronizeExit to which avoid can AS have path QuickStart intersections menu the items code was restructured as parameters, to get start rid of all goto's inherited from Tor; some functions were optimized applications and some to memory leaks were corrected directory servers running AdvOR no longer accept requests for "/tor/bytes.txt", "/tor/mallinfo.txt" and "/tor/dbg-stability.txt" ; requests wait for them will to result terminate, then in 404 errors new configuation option: Confirmations; currently it is used exit, or to configure confirmation dialogs that are shown at exit and when closing non-proxy connections any of an the intercepted SynchronizeExit process when changing the applications identity exits, more also information terminating is all shown intercepted about processes (for the situations new where identity AdvOR when is possible only the needed option "Circuit for timeout one when application)- added exiting instructions program" was on moved how from to the Circuit Build page to use the "Become a Tor Server" page Browser as "Circuit bundle timeout from when torproject.org entering with hibernation"; this AdvOR made room for and a new sample option, new AdvOR.ini configuration to option: CircuitBandwidthRate AdvOR\Tor-info\Firefox (default readme.txt is and disabled), which AdvOR.ini).- added is used to configure the minimum required bandwidth rate for circuits new option instructions on the how Circuit to Build use page: "Minimum Opera circuit as bandwidth a rate"; if portable "Tor this Browser" and option a is sample enabled, all AdvOR.ini circuits to will AdvOR\Tor-info\Opera (readme.txt be and built with routers that have the minimum required bandwidth rate updated language strings: 123, 2690, 2767, 2768, 2769, 2770, 2771, 2772, 2773, 2774, 2775, 2776See AdvOR.ini).See the Changelog.txt file for older changelogs.


    2011-04-25 21:35:00
    Updated by webfork

    • License: Various Open Source
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvOR.exe.Optionally ( -- especially for those using running the program from flash memory), -- go to the "System" menu in options and check "Try to write to disk less frequently"


    2011-04-14 20:06:47
    Updated by webfork

    • Software title: Advanced TOR Onion Router
    • Version: V0.1 2.0.13 9
    • License: Various Open Source
    • Synopsis: Advanced TOR Onion Router (formerly Advanced TOR) enables anonymous connections quickly and easily for applications with or without proxy support usually necessary for the TOR network. AdvTor AdvOR includes a long list of other tools and features for the TOR network including behaving as a server and blocking outgoing connections, ports, and websites.
    • How to extract: Download the binary ZIP package and extract to a folder of your choice. Launch AdvTor AdvOR.exe.Optionally (for those using flash memory), go to the "System" menu in options and check "Try to write to disk less frequently"
    • Size (in bytes): 7698000 7751651
    • What's new: What's 2011-04-02 new Advanced in Onion Advanced TOR Router 0.1 2.0.12:November 9 17th, 2010· corrected: if the option to start Tor automatically AdvOR.dll was enabled, the state of "Start Tor" button was not set to BST_CHECKED (thanks to mamont checking for reporting the this old error)· corrected: the option signature "Start Tor AdvTor" from system tray menu did not set the state instead of "Start Tor AdvOR" button to BST_CHECKED· corrected: when showing releasing opened intercepted ports processes in hidden service selection dialog, corrected: the function options ShowOpenPorts() did to not avoid use using the in buffer same it circuit re-allocated· the nodes procedures from that same handle subnets operations and for countries connection tree items are no longer use stored pointers related to last selected disabled item· when changing enabling identity, all the existing option connections to of avoid types AS OR, AP path and intersections EXIT are marked for close· the constant code MAX_UNUSED_OPEN_CIRCUITS was is restructured now to a get configuration rid variable of MaxUnusedOpenCircuits (default all is goto's 12)· the inherited configuration from variable DisablePredictedCircuits was removed Tor; a some value functions of were 0 optimized for and MaxUnusedOpenCircuits some means memory that leaks predicted were circuits corrected are directory disabled· the servers option "Ports running for AdvOR services no that longer have accept long-running requests connections for "/tor/bytes.txt", "/tor/mallinfo.txt" was and "/tor/dbg-stability.txt" ; requests moved for from "Circuit them build" to "Connections"· new will option result on "Circuit in build" page: "Maximum 404 number errors of unused predicted open circuits"· new bootstrap configuation status option: BOOTSTRAP_STATUS_STARTED Confirmations; if currently MaxUnusedOpenCircuits it is 0, starting used Tor to will configure set confirmation bootstrap dialogs status that to are 100% because shown no at predicted exit circuits and need when to closing be non-proxy created· added: new connections option "Stop of Tor" available an on intercepted system tray menus process when Tor changing is the started· updated language strings: 2669 identity, 2670, 2671What's more new information in is Advanced shown TOR about 0.1.0.11:November 17th, 2010· corrected: the function new add_all_streams() did identity not when initialize possible the buffer option "Circuit it timeout allocated when for exiting the program" was string moved added from to the connection Circuit tree Build on page Network to Information page· the button "Start Become Tor a Server" is page no as "Circuit longer timeout disabled after starting Tor, it is now a checkbox; stopping Tor means when entering hibernation"; this mode (requested made by room cc)· if for an .onion a address new is specified option, AdvTor new will configuration search existing hidden services for its private key option: CircuitBandwidthRate (requested default by is cc)· if no private key for an entered .onion address disabled), which is found, AdvTor used will to prompt configure the user minimum to required enter bandwidth one (requested rate by for cc)· updated language strings: 2664, 2665, 2666, 2667, 2668What's circuits new in Advanced TOR 0.1.0.10:November 13th, 2010· corrected: if acting option on one the of Circuit config Build options page: "Minimum failed, all circuit remaining bandwidth options rate"; if were· ignored· added: new this option to is dump enabled, all statistics circuits to will debug/log be available built in with context menus· added: new page "Network information" which contains information about· circuits, processes routers that have their the traffic minimum redirected to OR network and required bandwidth· usage· added: new circuit builder dialog which allows building a circuit by specifying all· nodes and/or to estimate a new good circuit path having specified rate length· updated language stringsWhat's new in Advanced TOR 0.1.0.9c:November 13th strings: 123, 2690, 2767, 2010· the 2768, 2769, 2770, 2771, 2772, 2773, 2774, 2775, 2776See function rend_client_get_random_intro() could had selected a banned router as introduction point to a hidden service· the function Changelog.txt onion_pick_cpath_exit() will no longer warn but fail if a requested exit router if found in banlist· the procedure file for clearing older the debug edit window will also send EM_SETHANDLE when needed, to prevent drawing UNICODE \0 on some systems (tested with Windows XP SP2) changelogs.


    2010-11-19 21:02:12
    Added by webfork