Unbelievable! TorBox v.0.5.3 was released approximately 1,5 years ago, and the image was updated a year ago because of the rebasing of Raspberry Pi OS on Debian 12 Bookworm. The installation script worked fine until the Raspberry Pi OS release on November 19th 2024, which broke the installation because of removed packages. Therefore, we decided to release TorBox v.0.5.4 even if we have to move some features to the next version.
Significant new features implemented into TorBox v.0.5.4 are TorBox on a Cloud and TorBox mini:
- TorBox on a Cloud stands for the possibility of installing TorBox on a cloud server and giving your clients access by using OpenVPN as a server. No Raspberry Pi hardware is necessary for using TorBox on a Cloud, just a virtual server with Raspberry Pi OS, Debian or Ubuntu. On the virtual server, the correct installation script has to be run using the
--on_a_cloud
option. Important: the installation will overwrite your entire configuration on the cloud — be very careful with it! Once installed, configured and connected with OpenVPN, the data stream from your client machine will be routed through your TorBox on a Cloud to the tor network. It is literally a private VPN with tor functionality, and it is also a good starting point for using Onion Services. For more details, see here. - TorBox mini uses a Raspberry Pi Zero 2 W as a RNDIS/Ethernet gadget, which acts as a network device when connected to your computer. It is a good solution when a TorBox on a Raspberry Pi 3 Model B+, a Raspberry Pi 4 Model B or a Raspberry Pi 5 is too big or expensive to use. The SD Card for the TorBox mini can be created by using the Raspberry Pi OS installation script with the option
--torbox-mini
by using a Raspberry Pi. To make it easier, starting with this release, we also provide a separate image file for the Raspberry Pi Zero 2 W. For more details, see here.
• • •
TorBox Image (about 1 GB): v.0.5.4 (11.01.2025) – SHA-256 values
TorBox mini Image (about 1 GB): v.0.5.4 (30.12.2024) – SHA-256 values
TorBox Menu only: v.0.5.4 (11.01.2025) – SHA-256 values
Or download the image from our TorBox on the cloud test installation.
Since we had to install additional software packages and update the configuration files, it is necessary to use the new image or reinstall TorBox using one of our installation scripts.
Note: Because of the significantly better compression rate, we compress the images with xz. By default, Balena Etcher and Raspberry Pi Imager should support this kind of compressed image, but they fail often with an error message. Therefore, we recommend to decompress the .xz file first.
• • •
Changelog: v.0.5.3 –> v.0.5.4
- New: You can use your TorBox as an OpenVPN server, even if your installation is not on the cloud. It may be useful if your TorBox is at home and you are with your client elsewhere.
- New: We added support for domain exclusion into
rc.local
- New: TACA action if triggered by “Failed to find node for hop” or “Your system clock just jumped” (added with the update from 30.12.2024)
- Updated: The system is based on Raspberry Pi OS “Bookworm” lite 64bit with the Linux Kernel 6.6.62 and Tor version 0.4.8.13 with obfs4proxy version 0.0.14 and Snowflake 2.10.1. It is ready to run on a Raspberry Pi 5.
- Updated: TorBox FileSharing (TFS) to 2.0 –> more stable and easier to use.
- Updated: OBFS4 and Snowflake Bridge strings.
- Updated: Support for Adafruit’s PiTFT displays
- Updated: The backup and restore capabilities were updated to keep up with the newly integrated features. Also, at the same time, we removed a bunch of bugs, which, in some instances, could hinder a successful restoration.
- Changed: The default for the countermeasures against a tightly configured firewall is off. We changed the default from on to off because this setting interferes with the correct function of the tor bridges functionality.
- Changed: We removed the installation of additional network drivers from the First Start-up Dialogue because they are already installed on the image file. The additional network drivers can be installed and updated using the Update and Maintenance sub-menu if necessary.
- Fixed: Using public DNS server during IP scan for domain exclusion from tor routing
- Fixed: Pressing the ESC key stops the hostname change/randomization without changing the hostname.
- Fixed: Features exclusively working on a Raspberry Pi are now blocked on other hardware.
- Fixed: Enabling the installation/update of tor versions 0.4.8.x. Again, we must use the official Tor repository because the unofficial Tor repository on GitHub is no longer maintained. This could be problematic for users located in censuring countries.
- Fixed: Enabling the installation of
snowflake
version 2.8.1. Also,snowflake
is now working under Ubuntu (aparmor
configuration added). - Fixed: Similar Snowflake Bridges were activated and deleted simultaneously. We improved the comparison algorithm to avoid that behaviour.
- Fixed: Adding two bridges automatically resulted in a wrong country description in
torrc
. - Fixed:
machchanger -p
brokerc.local
- Fixed: Onion Services: check if necessary directories exist and create them, if needed. Also, we resolved ownership and permission issues.
- Fixed: SocksPort 127.0.0.1:9050 was disabled (added with the update from 30.12.2024).
- Fixed: Some compatibility issues with Ubuntu 24.10 and Python 3.12 have been fixed, but this is not finished yet (added with the update from 30.12.2024).
- Improved: Predictable Network Interface Names are disabled on Debian systems.
- Improved: If you want to get the Internet from a non-existent interface, the menu will warn you and advise you to choose another interface. However, we still give the user the choice to try it anyway because sometimes, a network reconfiguration behind the back is necessary. Of course, in the worst case, the user will lock himself out if he pushes the system too far. 🤷♂️
- Improved: The way TorBox is configuring the network when switching from one interface to another. This should minimise disconnections and lock-out situations (added with the update from 30.12.2024).
- Improved: In the Configuration sub-menu, TorBox’s Wlan can only be enabled if a wireless ethernet device is present (this doesn’t affect the installation).
- Improved: The user will see the same progress screen when tor is restarted. We removed the separate „success or fail“ message boxes if the entries in the main menu were used because the “fail” message was often wrong.
- Improved: Reduced the number of internal hosts, which
iptables
addresses. This should also reduce the number of possible clashes if a 192er network is used in the same network. We also improved theiptables
rules. - Improved: Because Snowflake Bridges are always wrongly displayed as “OFFLINE”, all online checking for Snowflake is now disabled.
- Improved: The listing of Snowflake bridges.
- Improved: If you fail to install with the installation scripts, you can continue without redoing the previous steps by using the option
--continue_with_step
. - Improved: Replaced the white coloured font with a yellow colour due to visibility problems on a terminal with a white background.
- Improved: To ensure that ALL wireless devices’ power-saving mode is switched off (added with the update from 30.12.2024).
- Removed: exim4, modemmanager, netmanager
• • •
We need your feedback!!
We hope this version pleases you. However, we are dependent on feedback. It is not just about fixing bugs and improving usability, but also about supporting additional interfaces and hardware in future releases:
- What do you like?
- What should be improved (why and how)?
- What would you like to see next? Which features do you request?
With the TorBox GitHub repository, it is straightforward for everyone to report issues or change the code and propose it in a pull request. Because we continue to travel around, it sometimes needs more time to address the issues and proposals.
For future versions, it is essential that we know what you need and want to see from the Onion Services implementation. Please feel free to use the discussion forum to tell us your needs.