Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-09 Thread nb.linux
t...@t-3.net: > Redhat's emailed warning to update OpenSSL went out yesterday as > "Security Advisory - RHSA-2014:0376-1". CentOS' updated OpenSSL > was available right away as well, and the CentOS 6.5 boxes pulled it > right down > in an update. just FYI: https://listserv.fnal.gov/scripts/wa.exe?

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-09 Thread tor
On 04/09/2014 04:39 AM, Roger Dingledine wrote:> On Tue, Apr 08, 2014 at 07:31:43PM -0600, Jesse Victors wrote: >> I'd recommend that every relay operator delete their keys as well, > > Not every. Those on OpenSSL 0.9.8, e.g. because they're using Debian > oldstable, were never vulnerable to t

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Jesus Cea
On 08/04/14 17:01, Moritz Bartl wrote: > On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: >> Greetings all. I follwed the above instructions on my relay. Upon >> restarting Tor I have lost all of my flags and I have a new fingerprint. >> Previously I had the Fast, Guard, Named, Running, Stable

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 07:31:43PM -0600, Jesse Victors wrote: > I'd recommend that every relay operator delete their keys as well, Not every. Those on OpenSSL 0.9.8, e.g. because they're using Debian oldstable, were never vulnerable to this bug. I imagine there are some FreeBSD or the like people

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Jesse Victors
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I've updated OpenSSL, deleted the keys on my exit per the recommendations, and restarted the whole box. I got a new fingerprint. I'll watch to see how long the flags take to come back, but I predict it will be like a new relay. I wonder how this cha

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread grarpamp
On Tue, Apr 8, 2014 at 4:04 PM, Roger Dingledine wrote: > Actually, I'd like us to take this opportunity to throw out the Named > and Unnamed flags entirely. > I think we've done pretty well at teaching > users to use $fingerprints rather than nicknames in the few cases where > they actually want

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread grarpamp
On Tue, Apr 8, 2014 at 4:34 PM, Roger Dingledine wrote: > On Tue, Apr 08, 2014 at 04:35:39PM +0100, mick wrote: >> Moritz Bartl allegedly wrote: >> > Yes. You made it generate new keys, so it is a "new relay" as far as >> > Tor is concerned. This is why not everybody should generate new keys >> >

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 04:35:39PM +0100, mick wrote: > Moritz Bartl allegedly wrote: > > Yes. You made it generate new keys, so it is a "new relay" as far as > > Tor is concerned. This is why not everybody should generate new keys > > immediately, especially larger relays. But don't worry too muc

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hy community :( It seems, that we are seriously f# since 14 MAR 2012 with the release of the openssl 1.0.1 branch until yesterday!!! Affected services which used these libraries are enormous. ftps, https, imaps, smtp over ssl, xmpp, and so on

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 07:00:53PM +0200, Andreas Krey wrote: > On Tue, 08 Apr 2014 17:01:18 +, Moritz Bartl wrote: > ... > > immediately, especially larger relays. But don't worry too much, you'll > > get your flags back eventually. :) > > But my name only very eventually? Correct. Actually

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Chris Whittleston
Yup - looks like I just missed it before, updated - now to clear keys and reboot. Thanks, Chris On 8 April 2014 20:48, Alexander Dietrich wrote: > I just got 1.0.1e-2+rvt+deb7u5, try again? > > Best regards, > > Alexander > > --- > PGP Key: 0xC55A356B | https://dietrich.cx/pgp > > On 2014-0

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Alexander Dietrich
I just got 1.0.1e-2+rvt+deb7u5, try again? Best regards, Alexander --- PGP Key: 0xC55A356B | https://dietrich.cx/pgp On 2014-04-08 21:27, Chris Whittleston wrote: > I run a relay on a Raspberry Pi and have just gone through and updated > (apt-get update, apt-get upgrade') but it seems

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Chris Whittleston
I run a relay on a Raspberry Pi and have just gone through and updated (apt-get update, apt-get upgrade') but it seems like the latest version available is still compromised? openssl (1.0.1e-2+rvt+deb7u4) If so - recommendations as to where I might be able to find an updated version for the pi wo

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread David Serrano
On 2014-04-08 09:20:28 (-0700), ecart...@riseup.net wrote: > > Update: I now have Running, Unnamed, V2Dir and Valid flags after 90 > minutes of uptime. So I guess all is well. So do I. I guess Named will be the toughest of them all :). -- David Serrano GnuPG id: 280A01F9 signature.asc Des

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread elrippo
Indeed, you should check you /var/lib/tor/keys directory to be empty before restarting your service again. ATTENTION!!! On a Debian box, i got the "warning" to restart the openssh and openvpn server, to be sure that these services use the new libssl binaries. It is recommended to not only resta

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread mick
On Tue, 08 Apr 2014 19:04:08 +0200 Lukas Erlacher allegedly wrote: > On Debian or Ubuntu: > > service tor stop && rm /var/lib/tor/keys/* && apt-get update && > apt-get -y upgrade > You might want to restart tor after that. -

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Andreas Krey
On Tue, 08 Apr 2014 17:01:18 +, Moritz Bartl wrote: ... > immediately, especially larger relays. But don't worry too much, you'll > get your flags back eventually. :) But my name only very eventually? Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds Date: Fri, 22 Jan 2

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Lukas Erlacher
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf > Of mick > Sent: Tuesday, April 8, 2014 11:36 AM > To: tor-relays@lists.torproject.org > Subject: Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade > > On Tue, 08 Apr 2014 17:01:18

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread ecarter9
Update: I now have Running, Unnamed, V2Dir and Valid flags after 90 minutes of uptime. So I guess all is well. Disregard my second question I see you already addressed it, thanks. > Thanks Moritz. But shouldn't I at least be Fast Running Valid? I thought > that when I first set up the relay I

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread ecarter9
Thanks Moritz. But shouldn't I at least be Fast Running Valid? I thought that when I first set up the relay I received those flags almost immediately, but I've been running for over an hour and I still have no flags at all. Also, if all relays lose their flags won't we be left with an inoperable

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Dennis Crawford
Where is the instructions for this? Thanks! Dennis -Original Message- From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf Of mick Sent: Tuesday, April 8, 2014 11:36 AM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Relays vulnerable to OpenSSL bug

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Zack Weinberg
On Tue, Apr 8, 2014 at 11:01 AM, Moritz Bartl wrote: > On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: >> Greetings all. I follwed the above instructions on my relay. Upon >> restarting Tor I have lost all of my flags and I have a new fingerprint. >> Previously I had the Fast, Guard, Named, R

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread mick
On Tue, 08 Apr 2014 17:01:18 +0200 Moritz Bartl allegedly wrote: > On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: > > Greetings all. I follwed the above instructions on my relay. Upon > > restarting Tor I have lost all of my flags and I have a new > > fingerprint. Previously I had the Fast,

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread ecarter9
> best practice would be to update > your OpenSSL package, discard all the files in keys/ in your > DataDirectory, and restart your Tor to generate new keys. Greetings all. I follwed the above instructions on my relay. Upon restarting Tor I have lost all of my flags and I have a new fingerprint

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Moritz Bartl
On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: > Greetings all. I follwed the above instructions on my relay. Upon > restarting Tor I have lost all of my flags and I have a new fingerprint. > Previously I had the Fast, Guard, Named, Running, Stable, and Valid flags. > Is this expected? Did

[tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-07 Thread Moritz Bartl
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 A new OpenSSL vulnerability on 1.0.1 through 1.0.1f is out today, which can be used to reveal memory to a connected client or server. If you're using an older OpenSSL version, you're safe. Note that this bug affects way more programs tha