[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7070 [Tor]: tor disables the SSLv3 for OpenSSL 1.0.0j



#7070: tor disables the SSLv3 for OpenSSL 1.0.0j
--------------------+-------------------------------------------------------
 Reporter:  kukabu  |          Owner:       
     Type:  defect  |         Status:  new  
 Priority:  normal  |      Milestone:       
Component:  Tor     |        Version:       
 Keywords:          |         Parent:  #4822
   Points:          |   Actualpoints:       
--------------------+-------------------------------------------------------

Comment(by arma):

 Replying to [comment:3 nickm]:
 > our best bet might be to just treat this as Fedora being Fedora, and
 accept that we will sometimes mistake a Fedora openssl for an older one
 than it really is.  Other approaches -- like testing for the presence of
 the bug at runtime, or trying to parse the human-readable version string
 -- seem like they would be error-prone too, just in different ways.

 How about letting config options choose Tor's behavior, and then the Tor
 rpm can, if it knows what openssl it will secretly be using, turn on
 behaviors that it wants?

 I haven't yet heard about an openssl feature that we're missing so badly
 that we should spend time on this issue though.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7070#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs