Bugzilla – Full Text Bug Listing |
Summary: | tor gives a warning about OpenSSL version mismatch | ||
---|---|---|---|
Product: | [openSUSE] openSUSE Distribution | Reporter: | Deleted Name <deleted> |
Component: | Network | Assignee: | Bernhard Wiedemann <bwiedemann> |
Status: | RESOLVED INVALID | QA Contact: | E-mail List <qa-bugs> |
Severity: | Minor | ||
Priority: | P5 - None | CC: | Andreas.Stieger, vcizek |
Version: | Leap 15.0 | ||
Target Milestone: | --- | ||
Hardware: | x86-64 | ||
OS: | Other | ||
Whiteboard: | |||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Deleted Name
2019-03-15 12:44:19 UTC
* Step 3 has a typo. Should be 'torctl' not 'tortlc' You have installed a different openssl library than the tor package was compiled with. In this case it's a harmless warning. OpenSSL guarantees binary compatibility over letter and the third digit numbers. Eg. 1.1.0i and 1.1.1a are binary compatible. You can check the ABI changes between the openssl versions here: https://abi-laboratory.pro/?view=timeline&l=openssl Starting with the next major release of OpenSSL, there will be a change in the versioning: https://www.openssl.org/policies/releasestrat.html But that's something for the future. To sum it up, the version check in Tor is just too strict. It expects the very same version (the same openssl version number and the version text) for runtime as it was compiled with. I find that unnecessary and the test could certainly be relaxed. I know Tor takes the security of its users seriously, but IMHO here it's just being overly rigorous. expected minor and informational warning Trying to upstream a relaxed version check: https://github.com/torproject/tor/pull/951 |