[Tor-BSD] Recognizing Randomness Exhaustion

Libertas libertas at mykolab.com
Wed Dec 31 17:49:39 EST 2014


I also completely forgot to mention the below warning, which Tor
0.2.5.10 (the current release) gives when run on OpenBSD 5.6-stable amd64:

> We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later,
> but with a version of OpenSSL that apparently lacks accelerated
> support for the NIST P-224 and P-256 groups. Building openssl with
> such support (using the enable-ec_nistp_64_gcc_128 option when
> configuring it) would make ECDH much faster.

Were the mentioned SSL features removed from LibreSSL, or have they not
yet been introduced? Could this be the culprit?


More information about the Tor-BSD mailing list