[tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on	CentOS 6
    Tor Bug Tracker & Wiki 
    torproject-admin at torproject.org
       
    Mon Jan  9 02:48:21 UTC 2012
    
    
  
#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
 Reporter:  Pascal     |          Owner:  nickm             
     Type:  defect     |         Status:  accepted          
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: 0.2.3.9-alpha
 Keywords:  aes        |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------
Comment(by fermenthor):
 I can confirm this is an openssl bug in CRYPTO_ctr128_encrypt, fixed in
 1.0.0a with the last hunk of
 [http://permalink.gmane.org/gmane.comp.encryption.openssl.cvs/10444 this
 patch] ("n=0" bug).
 The problem with version checking is that rpms from redhat will continue
 to patch the openssl header with OPENSSL_VERSION_NUMBER 0x10000003 for ABI
 compatibility. Even if you build on fedora with openssl-1.0.0f-1, Tor will
 not use the counter mode.
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:26>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list