[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6



#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
 Reporter:  Pascal     |          Owner:  nickm             
     Type:  defect     |         Status:  accepted          
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: 0.2.3.9-alpha
 Keywords:  aes        |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------

Comment(by nickm):

 Replying to [comment:15 nickm]:
 > Hooray, results!  I can confirm that the test passes (by saying "Looks
 ok to me") on Ubuntu 11.10 and on Fedora 16.
 >
 > There are a few possibilities here:
 >
 >  * The test shows a real bug in Centos's openssl.
 >  * The test shows a real bug in openssl itself.
 >  * The test is badly designed, and proves nothing.
 >  * The test is badly designed, and Tor has the same bad design in its
 use of AES_ctr128_encrypt.

 Oh, another possibility:

    * This bug was in openssl 1.0.0 and was fixed in subsequent version,
 but centos hasn't backported the fix.

 Unfortunately, I'm travelling with  a little netbook and intermittent till
 wednesday, so I probably won't be able to try building a bunch of
 different openssl versions until then.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:19>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs