aboutsummaryrefslogtreecommitdiff
path: root/changes/bug4822
blob: 73f43f04520f86fc250eb117d8f7dbfa5ce13bae (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
  o Major security workaround:
    - When building or running with any version of OpenSSL earlier
      than 0.9.8s or 1.0.0f, disable SSLv3 support. These versions had
      a bug (CVE-2011-4576) in which their block cipher padding
      included uninitialized data, potentially leaking sensitive
      information to any peer with whom they made a SSLv3
      connection. Tor does not use SSL v3 by default, but a hostile
      client or server could force an SSLv3 connection in order to
      gain information that they shouldn't have been able to get. The
      best solution here is to upgrade to OpenSSL 0.9.8s or 1.0.0f (or
      later). But when building or running with a non-upgraded
      OpenSSL, we should instead make sure that the bug can't happen
      by disabling SSLv3 entirely.