Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-23 Thread andreas
Not exactly a direct openSSL-Test, but you could check your specific OR-Port (or any other port you want to check) and see if it's a web-server related problem or not. i find this site quite useful: https://filippo.io/Heartbleed/ if you are checking you OR-Port tick the: Advanced (might cause

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-23 Thread andreas
And i completely ignored that this is just testing for heartbleed and not the latest openssl cve. so just ignore my previous mail :) but you could check against different ports with the tripwire python script [1] to check if its a web-server issue or not. i just ran it against my ORPort and

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-23 Thread Tora Tora Tora
Right you are. I did just run it against OR port and it tells it rejected early CCS. So it must be web server related problem. Thanks! On 06/23/2014 08:28 AM, andr...@reichster.de wrote: ... but you could check against different ports with the tripwire python script [1] to check if its a

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-22 Thread Andreas Reich
At least the qualys online test is only testing port 443 - could it be that you run your web-server on this port? If you run your web-server with e.g. mod-spdy you also have to update mod-spdy because it is built with its own openssl. This was a problem on my server too (not fedora or Centos

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-22 Thread Tora Tora Tora
Yes, both Qualys and Tripwire tests are testing a web server's HTTPS port. Yes, I do run mod_pagespeed on the web server. Alas, I get the same result when I disable it and restart Apache. It is however an interesting direction to investigate, since now I am thinking of examining other modules as

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-21 Thread Martin Bukatovič
On 06/20/2014 06:47 AM, Tora Tora Tora wrote: Regretfully, I have to shutdown my two middle relays (not too big, you won't even notice it :-D), since I am unable to resolve issues with the latest OpenSSL bug. I was able to find upgraded packages for Centos and Fedora that are supposed to

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-21 Thread Tora Tora Tora
Yes, I tried below steps, other than 'yum ps'. On 06/21/2014 02:00 PM, Martin Bukatovič wrote: ... You have probably figured this out already (you just needs to restart the tor daemon), but you may find the following handy (Fedora, CentOS, RHEL specific): To find out if your openssl

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-21 Thread Tora Tora Tora
And now I have tried a reboot. No change. Weird ... On 06/20/2014 12:32 PM, cbr...@hush.com wrote: Agreed. I had a few other issues and went the reboot route. ___ tor-relays mailing list tor-relays@lists.torproject.org

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-21 Thread Tora Tora Tora
Basically, I am left to conclude that (1) the latest update on Fedora/Centos does not patch CCS Injection vulnerability or (2) the test is wrong--correction, both Tripwire and Qualys tests are wrong or (3) between a Fedora and two Centos machines, one of which is really just a test machine, all

[tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread Tora Tora Tora
Regretfully, I have to shutdown my two middle relays (not too big, you won't even notice it :-D), since I am unable to resolve issues with the latest OpenSSL bug. I was able to find upgraded packages for Centos and Fedora that are supposed to address CVE-2014-0224 vulnerability (the change log

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread Simon Hanna
On Fri, Jun 20, 2014 at 6:47 AM, Tora Tora Tora t...@allthatnet.com wrote: Regretfully, I have to shutdown my two middle relays (not too big, you won't even notice it :-D), since I am unable to resolve issues with the latest OpenSSL bug. I was able to find upgraded packages for Centos and

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread Steve Snyder
On 06/20/2014 12:47 AM, Tora Tora Tora wrote: [snip] If someone can suggest a resolution that works, I might be able to keep them running, otherwise I see no point in running vulnerable relays until I figure things out. Suggestion #1: upgrade to current version of your OS and apply all

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread Tora Tora Tora
Sorry, I wasn't specific. I am running the latest Centos 6.5, build tor from source (0.2.5.4), have restarted all applications and confirmed the library used with 'lsof'. Since it is running other services, I have not tried to reboot yet. On 06/20/2014 07:45 AM, Steve Snyder wrote: On

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread Tora Tora Tora
Yes, restarted the applications and verified with 'lsof' On 06/20/2014 04:12 AM, Simon Hanna wrote: ... Did you restart all applications that are using openssl? If not, they continue to use the old librariers. Best way is to just do a complete restart..

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread Steve Snyder
You don't have to reboot the server. Just do a lsof | grep DEL (and maybe lsof | grep delete) and restart those services that are using upgraded libraries. That said, there have been a couple of kernel updates in recent weeks (the latest being yesterday), so it is advisable to bite the bullet

Re: [tor-relays] Shutting down middle relays (off-topic)

2014-06-20 Thread cbr...@hush.com
Agreed. I had a few other issues and went the reboot route. On 06/20/2014 at 10:42 AM, Steve Snyder wrote:You don't have to reboot the server. Just do a lsof | grep DEL (and maybe lsof | grep delete) and restart those services that are using upgraded libraries. That said, there have been a