> Tor is not vulnerable to the attack when used with the broken OpenSSL,
> but the patch stops it from working correctly as described in the
> above thread. The issue is fixed only in the alpha version of Tor, and
> AFAIK won't be fixed in stable:
>
> https://blog.torproject.org/blog/tor-0226-alpha-released

It is fixed in Tor's stable release already:

http://archives.seul.org/tor/announce/Dec-2009/msg00000.html

Changes in version 0.2.1.21 - 2009-12-21
 o Major bugfixes:
   - Work around a security feature in OpenSSL 0.9.8l that prevents our
     handshake from working unless we explicitly tell OpenSSL that we
     are using SSL renegotiation safely. We are, of course, but OpenSSL
     0.9.8l won't work unless we say we are.

In "master" there's even a fix for the so far unreleased OpenSSL
0.9.8m already, see:
https://git.torproject.org/checkout/tor/master/ChangeLog

> I don't want to run alpha Tor, or use broken OpenSSL. What should I do
> to make stable Tor run (I am not a coder, just a user - so I can't put
> up and hack up :) )?

In fact to upgrade the port is quite easy, I do that myself with the
alpha version sometimes. Usually it's just replacing the version
number in the port's Makefile and then "make makesum && make package",
check if everything is ok and install the new package.

More info here: http://www.openbsd.org/faq/ports/guide.html#PortsUpdate

> Are there any plans to replace OpenSSL with something more secure?
>
> Thanks.

Tas.

Reply via email to