[or-cvs] [tor/master 1/2] Demote a warning about missing client ciphers

arma at torproject.org arma at torproject.org
Tue Apr 20 07:59:51 UTC 2010


Author: Sebastian Hahn <sebastian at torproject.org>
Date: Mon, 19 Apr 2010 22:38:44 +0200
Subject: Demote a warning about missing client ciphers
Commit: 0b82ce3eb6feeb48e2e3094de297156e536527a0

---
 changes/demote_no_cipher_warning |    5 +++++
 src/common/tortls.c              |    4 ++--
 2 files changed, 7 insertions(+), 2 deletions(-)
 create mode 100644 changes/demote_no_cipher_warning

diff --git a/changes/demote_no_cipher_warning b/changes/demote_no_cipher_warning
new file mode 100644
index 0000000..24fcfdd
--- /dev/null
+++ b/changes/demote_no_cipher_warning
@@ -0,0 +1,5 @@
+  o Minor bugfixes:
+    - Demote a warning that relay operators might get when someone is
+      trying to talk to their OrPort. It is neither the operator's fault
+      nor can they do anything about it. Bugfix on 0.2.0.14-alpha; fixes
+      bug 1364.
diff --git a/src/common/tortls.c b/src/common/tortls.c
index 9adbfa4..218f110 100644
--- a/src/common/tortls.c
+++ b/src/common/tortls.c
@@ -746,11 +746,11 @@ tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address)
   /* If we reached this point, we just got a client hello.  See if there is
    * a cipher list. */
   if (!(session = SSL_get_session((SSL *)ssl))) {
-    log_warn(LD_NET, "No session on TLS?");
+    log_info(LD_NET, "No session on TLS?");
     return 0;
   }
   if (!session->ciphers) {
-    log_warn(LD_NET, "No ciphers on session");
+    log_info(LD_NET, "No ciphers on session");
     return 0;
   }
   /* Now we need to see if there are any ciphers whose presence means we're
-- 
1.6.5




More information about the tor-commits mailing list