Re: [tor-dev] Quick logjam/Tor analysis.

2015-06-02 Thread Yawning Angel
On Wed, 3 Jun 2015 00:43:50 +1000 teor wrote: > (Mac) OS X Yosemite 10.10 and earlier ship with OpenSSL 0.9.8 and > 0.9.7. > > [snip] > > While it's possible to build or install OpenSSL 1.0 or 1.1 on OS X, > it's not the default. > > How does this affect Tor and/or Tor Browser on OS X? Tor Brows

Re: [tor-dev] Quick logjam/Tor analysis.

2015-06-02 Thread teor
> Date: Tue, 26 May 2015 09:25:22 -0400 > From: Nick Mathewson > > I posted this on a blog comment, but others may be interested too. > > > As near as I can tell, the "logjam"/"weakdh" attacks should not affect > current Tor software very much, for a few reasons: > > * All currently supporte

Re: [tor-dev] Quick logjam/Tor analysis.

2015-05-26 Thread sid77
On the browser side, while waiting for vendor updates, Mozilla released https://addons.mozilla.org/en-US/firefox/addon/disable-dhe/ which does something very similar to https://addons.mozilla.org/en-us/firefox/addon/strict-ssl3-configuration/ (shameless plug) which disables broken or weak ciphe

[tor-dev] Quick logjam/Tor analysis.

2015-05-26 Thread Nick Mathewson
I posted this on a blog comment, but others may be interested too. As near as I can tell, the "logjam"/"weakdh" attacks should not affect current Tor software very much, for a few reasons: * All currently supported Tor versions, when built with OpenSSL 1.0 or later, prefer 256-bit elliptic