From 0b82ce3eb6feeb48e2e3094de297156e536527a0 Mon Sep 17 00:00:00 2001 From: Sebastian Hahn Date: Mon, 19 Apr 2010 22:38:44 +0200 Subject: Demote a warning about missing client ciphers --- changes/demote_no_cipher_warning | 5 +++++ src/common/tortls.c | 4 ++-- 2 files changed, 7 insertions(+), 2 deletions(-) create mode 100644 changes/demote_no_cipher_warning diff --git a/changes/demote_no_cipher_warning b/changes/demote_no_cipher_warning new file mode 100644 index 0000000000..24fcfdd726 --- /dev/null +++ b/changes/demote_no_cipher_warning @@ -0,0 +1,5 @@ + o Minor bugfixes: + - Demote a warning that relay operators might get when someone is + trying to talk to their OrPort. It is neither the operator's fault + nor can they do anything about it. Bugfix on 0.2.0.14-alpha; fixes + bug 1364. diff --git a/src/common/tortls.c b/src/common/tortls.c index 9adbfa41f1..218f110d8c 100644 --- a/src/common/tortls.c +++ b/src/common/tortls.c @@ -746,11 +746,11 @@ tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address) /* If we reached this point, we just got a client hello. See if there is * a cipher list. */ if (!(session = SSL_get_session((SSL *)ssl))) { - log_warn(LD_NET, "No session on TLS?"); + log_info(LD_NET, "No session on TLS?"); return 0; } if (!session->ciphers) { - log_warn(LD_NET, "No ciphers on session"); + log_info(LD_NET, "No ciphers on session"); return 0; } /* Now we need to see if there are any ciphers whose presence means we're -- cgit v1.2.3-54-g00ecf