[tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Dec 27 03:15:37 UTC 2011


#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
 Reporter:  Pascal     |          Owner:                    
     Type:  defect     |         Status:  new               
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: 0.2.3.9-alpha
 Keywords:  aes        |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------

Comment(by nickm):

 Interesting. I wonder if this computer has aesni instructions. Some of the
 patches there look like they could be doing odd things with intel
 instructions.  I guess the next step is to try to figure out ways to test
 whether Centos's openssl is behaving right.  One option would be to cook
 up a stress test for using AES_ctr128_encrypt() with small or unusual
 values for the data length, and make sure it gives the right output.  If
 this is a bug in the underlying AES_ctr128_encrypt() implementation, that
 should turn it up.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list