[tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Dec 27 02:28:35 UTC 2011


#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
 Reporter:  Pascal     |          Owner:                    
     Type:  defect     |         Status:  new               
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: 0.2.3.9-alpha
 Keywords:  aes        |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------

Comment(by nickm):

 Hm. I'd suspect something weird about the counter mode implementation
 then. It's working fine until the part of the test where it encrypts 3
 characters at a time and decrypts 5 at a time (see lines 143...150 of
 test_crypto.c).  Looking at the data above, the first 566 bytes of data is
 as expected, but then it gets messed up.

 So the first thing I'll want to check is the actual openssl source.  I
 looked around for a while, but I can't find a list of the patches (if any)
 that centos applies to the openssl version you mentioned. Do you have a
 pointer there?  An SRPM would be great.

 Also, I should really make sure that unpatched 1.0.0-fips works ok with
 Tor too.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list