Re: [tor-talk] Tor and Openssl bug CVE-2014-0160

2014-04-07 Thread kendrick eastes
from https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 : > 1. *Clients*: Tor Browser shouldn't be affected, since it uses libnss rather than openssl. But Tor clients could possibly be induced to send sensitive information like "what sites you visited in this session" to your

Re: [tor-talk] [cryptography] The Heartbleed Bug is a serious vulnerability in OpenSSL

2014-04-07 Thread Damian Johnson
>> http://heartbleed.com/ >> ... > > Patch your stuff. Indeed. Please see... https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor

Re: [tor-talk] Tor and Openssl bug CVE-2014-0160

2014-04-07 Thread Geoff Down
On Tue, Apr 8, 2014, at 12:17 AM, Roger Dingledine wrote: > A new OpenSSL vulnerability on 1.0.1 through 1.0.1f is out today, > which can be used to reveal up to 64kB of memory to a connected client > or server. > > https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 > > The short versio

[tor-talk] Tor and Openssl bug CVE-2014-0160

2014-04-07 Thread Roger Dingledine
A new OpenSSL vulnerability on 1.0.1 through 1.0.1f is out today, which can be used to reveal up to 64kB of memory to a connected client or server. https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 The short version is: upgrade your openssl (unless you're running an old one), and also mo

Re: [tor-talk] [cryptography] The Heartbleed Bug is a serious vulnerability in OpenSSL

2014-04-07 Thread grarpamp
> http://heartbleed.com/ > > The Heartbleed Bug is a serious vulnerability in the popular OpenSSL > cryptographic software library. This weakness allows stealing the > information protected, under normal conditions, by the SSL/TLS encryption > used to secure the Internet. SSL/TLS provides communica

Re: [tor-talk] Linux kernel transproxy packet leak (w/ repro case + workaround)

2014-04-07 Thread Rusty Bird
coderman: > On Wed, Apr 2, 2014 at 10:59 AM, Rusty Bird wrote: >> Maybe it can be boiled down to this: When redirecting *and* filtering, >> the filtering should be done in OUTPUT (instead of INPUT), ... > > this is where defense in depth at the multiple-virtual machine / > routing layer fails saf