Arti 0.3.0 is released: Robustness and API improvements

Arti is our ongoing project to create a working embeddable Tor client
in Rust. It’s not ready to replace the main Tor
implementation in C, but we believe that it’s the future.

Right now, our focus is on making Arti production-quality, by
stress-testing the code, hunting for likely bugs and adding missing
features that we know from experience that users will need. We’re
going to try not to break backward compatibility too much, but we’ll
do so when we think it’s a good idea.

What’s new in 0.3.0?

For a complete list of changes, have a look at the
CHANGELOG.

This release has bugfixes for many robustness issues affecting
failures to bootsrap. It includes automatic detection and reporting
of clock skew, when that affects bootstrapping. (This is a feature
we’ve wanted in Tor for a long time.)

We also add support for C tor-style “safe logging” (suppressing
sensitive client information from persistent logs).

For developers, we’ve continued to improve our configuration API and
make it more consistent. This involves a fair amount of breakage; we
hope that next release will only have minor API breaks in the
configuration logic.

There are also a bunch of smaller features, bugfixes, and
infrastructure improvements; again, see the CHANGELOG for a more
complete list.

And what’s next?

In the short term, there’s some pending work that wasn’t ready for
this release. Our next release will likely contain improved filesystem
permission checking, final improvements to the configuration logic, a
refactored directory download implementation, and more.

Beyond that, between now and our 1.0.0 milestone in September, we’re
aiming to make Arti a production-quality Tor client for direct
internet access. (Onion services aren’t funded yet, but we hope to
change that soon.)

To do so, we need to bring Arti up to par with the C tor implementation
in terms of its network performance, CPU usage, resiliency, and
security features. You can follow our progress on our 1.0.0
milestone
.

We still plan to continue regular releases between now and then.

Here’s how to try it out

We rely on users and volunteers to find problems in our software and
suggest directions for its improvement. Although Arti isn’t yet ready
for production use, you can test it as a SOCKS proxy (if you’re willing
to compile from source) and as an embeddable library (if you don’t mind
a little API instability).

Assuming you’ve installed Arti (with cargo install arti, or directly
from a cloned repository), you can use it to start a simple SOCKS proxy
for making connections via Tor with:

$ arti proxy -p 9150

and use it more or less as you would use the C Tor implementation!

(It doesn’t support onion services yet. If compilation doesn’t work, make sure you have development files for libsqlite installed on your platform.)

If you want to build a program with Arti, you probably want to start with the arti-client crate. Be sure to check out the examples too.

For more information, check out the README file. (For now, it assumes that you’re comfortable building Rust programs from the command line). Our CONTRIBUTING file has more information on installing development tools, and on using Arti inside of Tor Browser. (If you want to try that, please be aware that Arti doesn’t support onion services yet.)

When you find bugs, please report them on our bugtracker. You can request an account or report a bug anonymously.

And if this documentation doesn’t make sense, please ask questions! The questions you ask today might help improve the documentation tomorrow.

Call for feedback

Our priority for the coming months is to make Arti a production-quality Tor client, for the purposes of direct connections to the internet. (Onion services will come later.) We know some of the steps we’ll need to take to get there, but not all of them: we need to know what’s missing for your use-cases.

Whether you’re a user or a developer, please give Arti a try, and let us know what you think. The sooner we learn what you need, the better our chances of getting it into an early milestone.

Acknowledgments

Thanks to everybody who has contributed to this release, including
Christian Grigis, Dimitris Apostolou, Samanta Navarro, and
Trinity Pointard.

And thanks, of course, to Zcash Community Grants (formerly Zcash Open Major Grants (ZOMG)) for funding this project!

Link to original source



Categories: Tor Project

Leave a Reply