On Sat, Apr 12, 2014 at 05:51:46PM +0200, Nicolas Vigier wrote: > On Sat, 12 Apr 2014, Matthew Finkel wrote: > > > On Sat, Apr 12, 2014 at 05:04:27AM -0400, hi...@safe-mail.net wrote: > > > For those of us who compile Tor from source, does Tor need to be > > > recompiled > > > *after* the openssl update from our OS vendors? > > > > "Maybe". If you are upgrading OpenSSL from a much older version then you > > may need to recompile Tor (so it knows about the newer version and uses > > the correct headers and such) but if you're simply upgrading from, say, > > 1.0.1e to 1.0.1g then you should not need to recompile Tor. If you > > restart Tor it should use the newer version of openssl without issue. > > Unless tor was linked statically to openssl, using for instance the > --enable-static-openssl or --enable-static-tor configure options. > > Checking that tor is not linked statically can be done with ldd: > > $ ldd /usr/bin/tor > [...] > libssl.so.10 => /usr/lib64/libssl.so.10 (0x00007f6081b5c000)
Yes, this is a great point that I forgot to mention. Thanks! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk