[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7070 [Tor]: tor disables the SSLv3 for OpenSSL 1.0.0j
#7070: tor disables the SSLv3 for OpenSSL 1.0.0j
--------------------+-------------------------------------------------------
Reporter: kukabu | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor | Version:
Keywords: | Parent: #4822
Points: | Actualpoints:
--------------------+-------------------------------------------------------
Comment(by arma):
I'm similarly not a big fan of chasing around fedora trying to figure out
how they want you to learn what their openssl "really" is.
If their headers say openssl is one version, and something else says it's
something else, that sounds like a pretty clear bug to me. But I know they
don't consider it a bug. Is there some mechanism that they expose and
promise will be accurate, to figure out what capabilities they
added/changed? Or do they just not care about this situation either?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7070#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs