Apologies for my fuzziness regarding
the handshake type vs connection TLS
level as independent and other detail.
But I did have an approximation of the
correct idea. . .made the right
recommendation.
___
tor-relays mailing list
tor-relays@lists.torproje
On Sat, 01 Aug 2015 13:06:55 -0400
starlight.201...@binnacle.cx wrote:
> >Bug: Assertion r == 0 failed in crypto_generate_dynamic_dh_modulus
> >at ../src/common/crypto.c:1788.
> >
>
> Looks like you have DynamicDHGroups enabled
> in your torrc file.
Yes. Don't use it. It's kind of pointless sin
>Bug: Assertion r == 0 failed in crypto_generate_dynamic_dh_modulus at
>../src/common/crypto.c:1788.
>
Looks like you have DynamicDHGroups enabled
in your torrc file.
This is interesting because the recent
LogJam research indicates the NSA
has probably broken commonly used 1024
bit DH groups, wh
Hi there,
after a unsuspected reboot of wr3ck3d0ni0n01 I decided to refresh all the keys.
I took the chance to upgrade to 2.6.10 (Debian) and recognized that the
relay wont start afterwards. It looks like it is unable to generate the
new krypto:
Aug 01 11:56:01.000 [notice] Tor 0.2.6.10 (git-714