summaryrefslogtreecommitdiff
path: root/changes/bug4822
diff options
context:
space:
mode:
Diffstat (limited to 'changes/bug4822')
-rw-r--r--changes/bug482213
1 files changed, 0 insertions, 13 deletions
diff --git a/changes/bug4822 b/changes/bug4822
deleted file mode 100644
index 73f43f0452..0000000000
--- a/changes/bug4822
+++ /dev/null
@@ -1,13 +0,0 @@
- o Major security workaround:
- - When building or running with any version of OpenSSL earlier
- than 0.9.8s or 1.0.0f, disable SSLv3 support. These versions had
- a bug (CVE-2011-4576) in which their block cipher padding
- included uninitialized data, potentially leaking sensitive
- information to any peer with whom they made a SSLv3
- connection. Tor does not use SSL v3 by default, but a hostile
- client or server could force an SSLv3 connection in order to
- gain information that they shouldn't have been able to get. The
- best solution here is to upgrade to OpenSSL 0.9.8s or 1.0.0f (or
- later). But when building or running with a non-upgraded
- OpenSSL, we should instead make sure that the bug can't happen
- by disabling SSLv3 entirely.