[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
Reporter: Pascal | Owner:
Type: defect | Status: new
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version: Tor: 0.2.3.9-alpha
Keywords: aes | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Comment(by nickm):
Hm. I'd suspect something weird about the counter mode implementation
then. It's working fine until the part of the test where it encrypts 3
characters at a time and decrypts 5 at a time (see lines 143...150 of
test_crypto.c). Looking at the data above, the first 566 bytes of data is
as expected, but then it gets messed up.
So the first thing I'll want to check is the actual openssl source. I
looked around for a while, but I can't find a list of the patches (if any)
that centos applies to the openssl version you mentioned. Do you have a
pointer there? An SRPM would be great.
Also, I should really make sure that unpatched 1.0.0-fips works ok with
Tor too.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs