Tor is out

Yet another OpenSSL security patch broke its compatibility with Tor:
Tor makes relays work with OpenSSL 0.9.8p and 1.0.0.b.

The original announcement is at

Changes in version - 2010-11-21
Major bugfixes:

  • Resolve an incompatibility with openssl 0.9.8p and openssl 1.0.0b:
    No longer set the tlsext_host_name extension on server SSL objects;
    but continue to set it on client SSL objects. Our goal in setting
    it was to imitate a browser, not a vhosting server. Fixes bug 2204;
    bugfix on
  • Minor bugfixes:

  • Try harder not to exceed the maximum length of 50 KB when writing
    statistics to extra-info descriptors. This bug was triggered by very
    fast relays reporting exit-port, entry, and dirreq statistics.
    Reported by Olaf Selke. Bugfix on Fixes bug 2183.
  • Publish a router descriptor even if generating an extra-info
    descriptor fails. Previously we would not publish a router
    descriptor without an extra-info descriptor; this can cause fast
    exit relays collecting exit-port statistics to drop from the
    consensus. Bugfix on; fixes bug 2195.