[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] Tor not affected by recent openssl security advisories



Somebody always asks whether Tor is affected by each OpenSSL advisory,
so I'm sending this mail in order to get a URL to send people to.  :)

Here are today's advisories:
   https://mta.openssl.org/pipermail/openssl-announce/2016-January/000061.html

With respect to the first ( "DH small subgroups (CVE-2016-0701)" ),
Tor is not affected because we set the SSL_OP_SINGLE_DH_USE() option.
We started setting this option back in Tor 0.1.1.9-alpha, back in
2005.

With respect to the second ( "SSLv2 doesn't block disabled ciphers
(CVE-2015-3197)" ), Tor is not affected because we disable SSLv2 by
setting SSL_OP_NO_SSLv2. We started setting this option in Tor
0.0.2pre8, back in 2003.


Of course, other applications that you use over Tor may be affected,
even though Tor is not; please remember to upgrade them as patches
become available.

best wishes,
-- 
Nick
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev