[tor-bugs] #8179 [Tor]: openssl 1.0.1d seems to break SSL Handshakes/Renegotiations
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Feb 6 23:18:46 UTC 2013
#8179: openssl 1.0.1d seems to break SSL Handshakes/Renegotiations
----------------------------------------------------------+-----------------
Reporter: ruebezahl | Owner:
Type: defect | Status: new
Priority: critical | Milestone: Tor: 0.2.4.x-final
Component: Tor | Version: Tor: 0.2.4.10-alpha
Keywords: openssl tor-client backport-022 backport-023 | Parent:
Points: | Actualpoints:
----------------------------------------------------------+-----------------
Comment(by nickm):
Replying to [comment:8 ruebezahl]:
> The SSL-Errors seem to disapear when building with no-asm, and
bootstraping is 100% complete.
>
> But now I got this after the first Bootstrap:
>
> [notice] Bootstrapped 100%: Done.
> [warn] Your Guard
AccessNowKromyon03=6557396CF0EE5B72563A22BCAA0FF26E77FA3D08 is failing a
very large amount of circuits. Most likely this means the Tor network is
overloaded, but it could also mean an attack against you or potentially
the guard itself. Success counts are 62/177. Use counts are 0/0. 62
circuits completed, 0 were unusable, 0 collapsed, and 0 timed out. For
reference, your timeout cutoff is 131 seconds.
I wouldn't worry about this one in this case: Tor is just complaining
about all of the circuits it tried to launch to your guard node and failed
to do so back when it was building with a busted openssl.
Does your CPU have aesni instruction? ("cat /proc/cpuinfo |grep aes" will
tell you on Linuxy systems.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8179#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list