Re: [tor-dev] Minimum required ciphers for running Tor as both client and router.

2012-07-13 Thread Gino Badouri
Thanks Nick for the fast answer. I went trough the official OpenSSL cipher docs but also found a nice (probably outdated) list on the stackoverflow. Ciphers: no-idea -DOPENSSL_NO_IDEA no-aes-DOPENSSL_NO_AES no-camellia -DOPENSSL_NO_CAMELLIA no-seed -DOPENSSL_NO_SEED no-bf

Re: [tor-dev] Minimum required ciphers for running Tor as both client and router.

2012-07-13 Thread Nick Mathewson
On Fri, Jul 13, 2012 at 8:14 AM, Gino Badouri wrote: Hi! > From the OpenSSL documentation it seems that no-hw and no-engines leaves out > support for hardware crypto engines so those are safe to set (our devices > don't have them). > > Could anybody provide us with more "no-" options for ciphers

[tor-dev] Minimum required ciphers for running Tor as both client and router.

2012-07-13 Thread Gino Badouri
Hi there, First of all thanks for helping me last time with my mipsel build of Tor with statically linked OpenSSL. It's running fine and we're waiting for the last review of the bandwith-checking scripts before they go live. The second cluster we prepare will consist of low-powered PowerPC device