[tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Tue Dec 27 02:28:35 UTC 2011
#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
Reporter: Pascal | Owner:
Type: defect | Status: new
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version: Tor: 0.2.3.9-alpha
Keywords: aes | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Comment(by nickm):
Hm. I'd suspect something weird about the counter mode implementation
then. It's working fine until the part of the test where it encrypts 3
characters at a time and decrypts 5 at a time (see lines 143...150 of
test_crypto.c). Looking at the data above, the first 566 bytes of data is
as expected, but then it gets messed up.
So the first thing I'll want to check is the actual openssl source. I
looked around for a while, but I can't find a list of the patches (if any)
that centos applies to the openssl version you mentioned. Do you have a
pointer there? An SRPM would be great.
Also, I should really make sure that unpatched 1.0.0-fips works ok with
Tor too.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list