Skip to content
Snippets Groups Projects
  1. Jun 06, 2012
    • Nick Mathewson's avatar
      Change the default for DynamicDHGroups to 0 · 8a341cc4
      Nick Mathewson authored
      This feature can make Tor relays less identifiable by their use of the
      mod_ssl DH group, but at the cost of some usability (#4721) and bridge
      tracing (#6087) regressions.
      
      We should try to turn this on by default again if we find that the
      mod_ssl group is uncommon and/or we move to a different DH group size
      (see #6088).  Before we can do so, we need a fix for bugs #6087 and
      
      Resolves ticket #5598 for now.
      8a341cc4
    • Roger Dingledine's avatar
      0ee13dc2
  2. Jun 05, 2012
  3. Jun 04, 2012
  4. Jun 03, 2012
    • Nick Mathewson's avatar
      Work around a bug in OpenSSL 1.0.1's TLS 1.1 and TLS 1.2 support · 841a8d55
      Nick Mathewson authored
      It appears that when OpenSSL negotiates a 1.1 or 1.2 connection, and it
      decides to renegotiate, the client will send a record with version "1.0"
      rather than with the current TLS version.  This would cause the
      connection to fail whenever both sides had OpenSSL 1.0.1, and the v2 Tor
      handshake was in use.
      
      As a workaround, disable TLS 1.1 and TLS 1.2.  When a later version of
      OpenSSL is released, we can make this conditional on running a fixed
      version of OpenSSL.
      
      Alternatively, we could disable TLS 1.1 and TLS 1.2 only on the client
      side.  But doing it this way for now means that we not only fix TLS with
      patched clients; we also fix TLS when the server has this patch and the
      client does not.  That could be important to keep the network running
      well.
      
      Fixes bug 6033.
      841a8d55
  5. Jun 02, 2012
  6. May 31, 2012
Loading