Hi.

The OpenBSD 4.6 errata OpenSSL TLS renegotiation patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.6/common/004_openssl.patch
breaks stable release of Tor as described here (exactly the same issue
on FreeBSD):

http://archives.seul.org/tor/relays/Dec-2009/msg00014.html

Tor is not vulnerable to the attack when used with the broken OpenSSL,
but the patch stops it from working correctly as described in the
above thread. The issue is fixed only in the alpha version of Tor, and
AFAIK won't be fixed in stable:

https://blog.torproject.org/blog/tor-0226-alpha-released

I don't want to run alpha Tor, or use broken OpenSSL. What should I do
to make stable Tor run (I am not a coder, just a user - so I can't put
up and hack up :) )?

Are there any plans to replace OpenSSL with something more secure?

Thanks.

Reply via email to