[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor and Openssl on old OSX [was Tor and Openssl bug CVE-2014-0160]
On Tue, 08 Apr 2014 22:06:31 +0000, Geoff Down wrote:
>
...
> /library/tor/bin/tor:
> /opt/local/lib/libz.1.dylib (compatibility version 1.0.0,
> current version 1.2.5)
> /opt/local/lib/libevent-2.0.5.dylib (compatibility version
> 7.0.0, current version 7.4.0)
> /opt/local/lib/libssl.1.0.0.dylib (compatibility version 1.0.0,
> current version 1.0.0)
> /opt/local/lib/libcrypto.1.0.0.dylib (compatibility version
> 1.0.0, current version 1.0.0)
> /usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current
> version 88.1.12)
>
> libssl==openssl? If so, not vulnerable
Yes, and yes.
> > tor, when started, also tells the openssl version in the first message.
>
> Not any more, apparently, at Notice level. At Info level though:
> [info] tor_tls_init(): OpenSSL OpenSSL 1.0.0g 18 Jan 2012 looks like
> version 0.9.8m or later; I will try SSL_OP to enable renegotiation
> Looks promising.
Mine does (I just patched my relays):
Apr 08 20:59:34.454 [notice] Tor v0.2.4.21 (git-505962724c05445f) running on Linux with Libevent 1.4.13-stable and OpenSSL 1.0.1g.
Andreas
--
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk