Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New <torproject.org> SSL cert causes freakout. #84

Closed
tildelowengrimm opened this issue Apr 11, 2014 · 8 comments
Closed

New <torproject.org> SSL cert causes freakout. #84

tildelowengrimm opened this issue Apr 11, 2014 · 8 comments

Comments

@tildelowengrimm
Copy link

Starting TBL today, I get just a moment of the loading bar, then this:
tor-attack

After clicking to exit, Torbrowser doesn't start.

@saibot8
Copy link

saibot8 commented Apr 18, 2014

I can confirm the bug. I am getting the same error message.

@micah
Copy link

micah commented Apr 18, 2014

The problem appears to be related to Heartbleed, and the Torproject rotating its x.509 certificate for the website. The certificate itself appears to have been re-issued, although I haven't found any statement from the torproject about that re-issue or what the new fingerprints of that certificate should be.

Torbrowser-launcher ships a copy of the certificate, presumably to pin the certificate, and the one that is shipped doesn't validate, because it isn't the one being used anymore. The fix is probably to update that torproject.pem file with the new one, assuming it can be verified properly.

@micahflee micahflee reopened this Apr 18, 2014
@micahflee
Copy link
Collaborator

Ok, I just visited https://www.torproject.org/ in a browser (at a random coffee shop that I happen to be at in Brooklyn), downloaded the cert I see, and replaced it and tested, and it works for me.

This new cert has SHA256 fingerprint:
EA16D6DA769B676BC07A19A0CD21AAF15A9A6693A2C3CD7A87817DB16F5F48F5

And SHA1 fingerprint:
842456568ED7904347AA89AB777DA4943BA1A7D5

Now I'm gonna ask some people who know for sure if this is the right cert over secure channels to confirm before closing this bug.

@saibot8
Copy link

saibot8 commented Apr 18, 2014

I can confirm both (SHA1 & SHA256) fingerprints (accessing from Germany's DFN). (Then again, I am probably not a trustworthy entity, just a random user interested in the awesome software you guys make)

How to get the fingerprints with openssl:
openssl s_client -showcerts -connect torproject.org:443 | openssl x509 -fingerprint -sha1 -noout -in /dev/stdin
openssl s_client -showcerts -connect torproject.org:443 | openssl x509 -fingerprint -sha256 -noout -in /dev/stdin

This yields the following fingerprints (you can remove the colons with | sed 's/://g'):
SHA1: 84:24:56:56:8E:D7:90:43:47:AA:89:AB:77:7D:A4:94:3B:A1:A7:D5
SHA256: EA:16:D6:DA:76:9B:67:6B:C0:7A:19:A0:CD:21:AA:F1:5A:9A:66:93:A2:C3:CD:7A:87:81:7D:B1:6F:5F:48:F5

MeisterP added a commit to MeisterP/torbrowser-overlay that referenced this issue Apr 24, 2014
@grrrrr
Copy link

grrrrr commented Apr 30, 2014

Is there any eta on this? This bug leaves TBB unusable. As there is a new version (3.6) each time you start torbrowser-launcher it fails due to cert errors and the user can not use TBB.

@grrrrr grrrrr mentioned this issue Apr 30, 2014
@micahflee
Copy link
Collaborator

Sorry about this. I've been crazy busy, but this is quite important. Working on it now.

@micahflee
Copy link
Collaborator

I confirmed that 70522ef is the correct cert.

@grrrrr
Copy link

grrrrr commented May 1, 2014

@micahflee thank you, will the upbuntu ppa be updated to reflect this change?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants