[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6



#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
 Reporter:  Pascal     |          Owner:                    
     Type:  defect     |         Status:  new               
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: 0.2.3.9-alpha
 Keywords:  aes        |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------

Comment(by nickm):

 Hm. I'd suspect something weird about the counter mode implementation
 then. It's working fine until the part of the test where it encrypts 3
 characters at a time and decrypts 5 at a time (see lines 143...150 of
 test_crypto.c).  Looking at the data above, the first 566 bytes of data is
 as expected, but then it gets messed up.

 So the first thing I'll want to check is the actual openssl source.  I
 looked around for a while, but I can't find a list of the patches (if any)
 that centos applies to the openssl version you mentioned. Do you have a
 pointer there?  An SRPM would be great.

 Also, I should really make sure that unpatched 1.0.0-fips works ok with
 Tor too.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs