[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #12694 [Tor]: Upgrade to latest curve25519-donna32



#12694: Upgrade to latest curve25519-donna32
------------------------+----------------------------------
     Reporter:  nickm   |      Owner:
         Type:  defect  |     Status:  closed
     Priority:  major   |  Milestone:  Tor: 0.2.4.x-final
    Component:  Tor     |    Version:
   Resolution:  fixed   |   Keywords:  tor-relay curve25519
Actual Points:          |  Parent ID:
       Points:          |
------------------------+----------------------------------
Changes (by nickm):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 I made a branch -- "curve25519-donna32" -- for this, and merged it to
 0.2.4 and later.  My changelog entry:
 {{{
   o Major bugfixes:

     - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
       implementation that caused incorrect results on 32-bit
       implementations when certain malformed inputs were used along with
       a small class of private ntor keys. This bug does not currently
       appear to allow an attacker to learn private keys or impersonate a
       Tor server, but it could provide a means to distinguish 32-bit Tor
       implementations from 64-bit Tor implementations. Fixes bug 12694;
       bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
       Adam Langley.
 }}}

 (Arma has looked this over and asked me to merge it.)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/12694#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs