Re: [tor-relays] OpenSSL Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)

2016-05-04 Thread isis
Dhalgren Tor transcribed 0.4K bytes: > https://www.openssl.org/news/secadv/20160503.txt > > In general I understand that padding oracle attacks are principally a > hazard for browser communications. Am assuming that updating OpenSSL > for this fix is not an urgent priority for a Tor Relay. > >

[tor-relays] OpenSSL Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)

2016-05-04 Thread Dhalgren Tor
https://www.openssl.org/news/secadv/20160503.txt In general I understand that padding oracle attacks are principally a hazard for browser communications. Am assuming that updating OpenSSL for this fix is not an urgent priority for a Tor Relay. If anyone knows different please comment.