[tor-relays] OpenSSL Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)

Dhalgren Tor dhalgren.tor at gmail.com
Wed May 4 16:52:04 UTC 2016


https://www.openssl.org/news/secadv/20160503.txt

In general I understand that padding oracle attacks are principally a
hazard for browser communications.  Am assuming that updating OpenSSL
for this fix is not an urgent priority for a Tor Relay.

If anyone knows different please comment.


More information about the tor-relays mailing list