[tor-relays] Keep your Tor relays updated!

tagnaq tagnaq at gmail.com
Mon May 16 20:20:27 UTC 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 05/15/2011 09:19 PM, Sebastian Hahn wrote:
> Before you contact anyone appearing to run 0.2.2.19-alpha,
> check their descriptor and the git part of the version string
> therein

vulnerable (CVE-2011-0427):
Tor 0.2.2.19-alpha (git-e57cb6b9762a2f94) on Linux i686	(laurel, hardy)

safe (CVE-2011-0427):
Tor 0.2.2.19-alpha (git-35fcec38809f9805) on Linux i686		(ides)
Tor 0.2.2.19-alpha (git-e0d5a6e184967358) on Linux x86_64	(wii)
Tor 0.2.2.19-alpha (git-aba7bb705a69697a) on Linux x86_64	(Amunet)


Regarding contacting operators:
I'll try to reach a few high bandwidth vuln. relay operators to reduce
"vulnerable bandwidth" without sending many emails.
-----BEGIN PGP SIGNATURE-----

iF4EAREKAAYFAk3RhwsACgkQyM26BSNOM7aESwD+Is/m0TytdV5jGdNF9A3nxJ30
EMvNTnqO48Dww9fUJtUA/2/47nynqqLT9AwzR1jod2VQ/s5VnEhHbk/46wGXqyCw
=aHHB
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list