[tor-bugs] #4822 [Tor Client]: Avoid vulnerability CVE-2011-4576 : Disable SSL3?
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu Jan 5 02:19:48 UTC 2012
#4822: Avoid vulnerability CVE-2011-4576 : Disable SSL3?
------------------------+---------------------------------------------------
Reporter: nickm | Owner:
Type: defect | Status: needs_review
Priority: critical | Milestone: Tor: 0.2.1.x-final
Component: Tor Client | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
Comment(by nickm):
Replying to [comment:11 rransom]:
> Replying to [comment:9 nickm]:
> > Okay, please look at branch bug4822_021_v2 in my public repository. It
takes the SSL_OP_NO_SSLv3 approach.
>
> The `EVERYONE_HAS_AES` change probably belongs in a separate commit,
although I don't think leaving it in the same commit as the disable-SSL3
change will ever cause any trouble.
Right; I'm inclined to leave it.
> I still think we should use a runtime version check, not a compile-time
version check -- people ''will'' build Tor against an old OpenSSL shared
library and run it with a new one.
Hm. That case is actually safe; the problem would be if they built with a
newer one and ran with an older one. Does that seem likely? And
shouldn't a decent library system prevent this?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4822#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list