[tor-bugs] #15503 [Tor]: VIA PadLock suupport does not work.

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Mar 29 15:07:55 UTC 2015


#15503: VIA PadLock suupport does not work.
------------------------+--------------------------------
     Reporter:  toyboy  |      Owner:
         Type:  defect  |     Status:  new
     Priority:  normal  |  Milestone:  Tor: 0.2.7.x-final
    Component:  Tor     |    Version:  Tor: unspecified
   Resolution:          |   Keywords:  VIA PadLock, lorax
Actual Points:          |  Parent ID:
       Points:          |
------------------------+--------------------------------
Changes (by yawning):

 * keywords:  VIA PadLock => VIA PadLock, lorax
 * priority:  major => normal


Comment:

 Replying to [comment:1 nickm]:
 > I wonder whether that's the invocation from SSL, or the invocation from
 aes.c in Tor?  Tor's aes.c uses EVP_aes_128_ctr() by default, I think --
 is that accelerated in your setup?

 That's TLS.  Disabling GCM to test if padlock is working is sort of
 overkill, since we log which engines we're going to use.  The issue here
 is that the user is running "OpenSSL-1.0.1OhMyGodUpgradeNow", which does
 not have EVP CTR support (Checking through the git tags, while the code to
 support it has been in the master branch for a while, they've never
 shipped it in a stable release.

 If the underlying copy of OpenSSL supported it, we would use it.
 {{{
 #ifdef NID_aes_128_ctr
       log_engine("AES-128-CTR",
 ENGINE_get_cipher_engine(NID_aes_128_ctr));
 #endif
 }}}

 So, there's no bug on our side here for AES.  Since we don't use EVP based
 SHA1 currently, acceleration will not happen for that either, even if it
 happens to be available, which may be something we can fix, but I don't
 see this being major.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15503#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list