[tor-bugs] #4822 [Tor Client]: Avoid vulnerability CVE-2011-4576 : Disable SSL3?
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu Jan 5 02:11:12 UTC 2012
#4822: Avoid vulnerability CVE-2011-4576 : Disable SSL3?
------------------------+---------------------------------------------------
Reporter: nickm | Owner:
Type: defect | Status: needs_review
Priority: critical | Milestone: Tor: 0.2.1.x-final
Component: Tor Client | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
Comment(by rransom):
Replying to [comment:9 nickm]:
> Okay, please look at branch bug4822_021_v2 in my public repository. It
takes the SSL_OP_NO_SSLv3 approach.
The `EVERYONE_HAS_AES` change probably belongs in a separate commit,
although I don't think leaving it in the same commit as the disable-SSL3
change will ever cause any trouble.
I still think we should use a runtime version check, not a compile-time
version check -- people ''will'' build Tor against an old OpenSSL shared
library and run it with a new one.
Other than that, looks good.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4822#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list