[tor-bugs] #20460 [Core Tor/Tor]: tortls test failures with recent LibreSSL (OpenBSD -current)
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Oct 25 14:44:36 UTC 2016
#20460: tortls test failures with recent LibreSSL (OpenBSD -current)
------------------------------+------------------------------------
Reporter: rubiate | Owner:
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Core Tor/Tor | Version: Tor: 0.3.0.0-alpha-dev
Severity: Normal | Keywords: libressl openbsd
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
------------------------------+------------------------------------
Some tortls tests will segfault with recent LibreSSL
{{{
tortls/classify_client_ciphers: [forking] [Lost connection!]
[classify_client_ciphers FAILED]
tortls/client_is_using_v2_ciphers: [forking] [Lost connection!]
[client_is_using_v2_ciphers FAILED]
[...]
tortls/session_secret_cb: [forking] [Lost connection!]
[session_secret_cb FAILED]
}}}
The tests all do something like this:
one = get_cipher_by_name("ECDH-RSA-AES256-GCM-SHA384");
one->id = 0x00ff;
The problem is LibreSSL has removed support for ECDH ciphers
(https://marc.info/?l=openbsd-cvs&m=147689515531541&w=2), so
get_cipher_by_name() returns NULL.
This isn't in any released LibreSSL version yet but is in OpenBSD
-current.
--
Ticket URL: <https://troodi.torproject.org/projects/tor/ticket/20460>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list