Lars Edman @ LinuxSuSE
2014-09-15 07:35:37 UTC
Hi!
Not certain if this packaging list is the best to subscribe to? But
start here.
I run an updated openSUSE 12.3 x86_64 with openssl-1.0.1i-1.64.1.x86_64
Current tor-0.2.4.23-2.12.1.x86_64 from openSUSE-update seems to be
built against OpenSSL-1.0.1h and leaves the following warning msg:
sep 14 12:01:58.258 [Varning] OpenSSL version from headers does not
match the version we're running with. If you get weird crashes, that
might be why. (Compiled with 1000108f: OpenSSL 1.0.1h 5 Jun 2014;
running with 1000109f: OpenSSL 1.0.1i 6 Aug 2014).
I've experienced the same problem (and the "weird crashes") in my
Slackware server after upgrading OpenSSL, and rebuilt tor.
Will you rebuild tor and make an update, or do I have to build it
myself?
Tor also leaves another warning msg concerning the build:
sep 14 12:01:58.258 [Varning] Tor was compiled with the
--enable-bufferevents option. This is still experimental, and might
cause strange bugs. If you want a more stable Tor, be sure to build
without --enable-bufferevents.
And finally an ordinary message concering the build of openssl:
sep 14 12:01:58.258 [Meddelande] We were built to run on a 64-bit CPU,
with OpenSSL 1.0.1 or later, but with a version of OpenSSL that
apparently lacks accelerated support for the NIST P-224 and P-256
groups. Building openssl with such support (using the
enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH
much faster.
Best regards
Lars
Not certain if this packaging list is the best to subscribe to? But
start here.
I run an updated openSUSE 12.3 x86_64 with openssl-1.0.1i-1.64.1.x86_64
Current tor-0.2.4.23-2.12.1.x86_64 from openSUSE-update seems to be
built against OpenSSL-1.0.1h and leaves the following warning msg:
sep 14 12:01:58.258 [Varning] OpenSSL version from headers does not
match the version we're running with. If you get weird crashes, that
might be why. (Compiled with 1000108f: OpenSSL 1.0.1h 5 Jun 2014;
running with 1000109f: OpenSSL 1.0.1i 6 Aug 2014).
I've experienced the same problem (and the "weird crashes") in my
Slackware server after upgrading OpenSSL, and rebuilt tor.
Will you rebuild tor and make an update, or do I have to build it
myself?
Tor also leaves another warning msg concerning the build:
sep 14 12:01:58.258 [Varning] Tor was compiled with the
--enable-bufferevents option. This is still experimental, and might
cause strange bugs. If you want a more stable Tor, be sure to build
without --enable-bufferevents.
And finally an ordinary message concering the build of openssl:
sep 14 12:01:58.258 [Meddelande] We were built to run on a 64-bit CPU,
with OpenSSL 1.0.1 or later, but with a version of OpenSSL that
apparently lacks accelerated support for the NIST P-224 and P-256
groups. Building openssl with such support (using the
enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH
much faster.
Best regards
Lars
--
To unsubscribe, e-mail: opensuse-packaging+***@opensuse.org
To contact the owner, e-mail: opensuse-packaging+***@opensuse.org
To unsubscribe, e-mail: opensuse-packaging+***@opensuse.org
To contact the owner, e-mail: opensuse-packaging+***@opensuse.org