[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6



#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
 Reporter:  Pascal     |          Owner:  nickm             
     Type:  defect     |         Status:  accepted          
 Priority:  normal     |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: 0.2.3.9-alpha
 Keywords:  aes        |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------
Changes (by nickm):

  * priority:  major => normal


Comment:

 Replying to [comment:26 fermenthor]:
 > The problem with version checking is that rpms from redhat will continue
 to patch the openssl header with OPENSSL_VERSION_NUMBER 0x10000003 for ABI
 compatibility. Even if you build on fedora with openssl-1.0.0f-1, Tor will
 not use the counter mode.

 That's unfortunate but IMO something we can tolerate; such platforms won't
 get the improved performance till they eventually upgrade to a version
 with an accurate OPENSSL_VERSION_NUMBER.  I would welcome a patch that did
 the testing at runtime, but I don't think I'm going to have time to write
 one myself on a timeframe for inclusion in 0.2.3.x.  Any other takers?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs