[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7070 [Tor]: tor disables the SSLv3 for OpenSSL 1.0.0j



#7070: tor disables the SSLv3 for OpenSSL 1.0.0j
--------------------+-------------------------------------------------------
 Reporter:  kukabu  |          Owner:       
     Type:  defect  |         Status:  new  
 Priority:  normal  |      Milestone:       
Component:  Tor     |        Version:       
 Keywords:          |         Parent:  #4822
   Points:          |   Actualpoints:       
--------------------+-------------------------------------------------------

Comment(by arma):

 I'm similarly not a big fan of chasing around fedora trying to figure out
 how they want you to learn what their openssl "really" is.

 If their headers say openssl is one version, and something else says it's
 something else, that sounds like a pretty clear bug to me. But I know they
 don't consider it a bug. Is there some mechanism that they expose and
 promise will be accurate, to figure out what capabilities they
 added/changed? Or do they just not care about this situation either?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7070#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs