Bug ID | 1207914 |
---|---|
Summary | Legacy provider not enabled in openSSL 3 (breaks transmission) |
Classification | openSUSE |
Product | openSUSE Tumbleweed |
Version | Current |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Basesystem |
Assignee | screening-team-bugs@suse.de |
Reporter | lbeltrame@kde.org |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
As far as I know, transmission uses RC4 as cipher algorithm (cf https://github.com/termux/termux-packages/issues/10814#issuecomment-1157320098). However, this is not enabled by default in openSSL 3. This means that as soon as transmission starts, tries to load it, does not find it and promptly crashes: Thread 3 "transmission-da" received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7ffff66a66c0 (LWP 19992)] 0x00007ffff799180f in EVP_CIPHER_CTX_set_key_length (c=c@entry=0x0, keylen=keylen@entry=20) at crypto/evp/evp_enc.c:994 Downloading 0.05 MB source file /usr/src/debug/openssl-3.0.7/crypto/evp/evp_enc.c 994 if (c->cipher->prov != NULL) { (gdb) print c $1 = (EVP_CIPHER_CTX *) 0x0 As detailed in the linked thread, the legacy provider (where RC4 is) should be enabled in openSSL 3 by adding [legacy_provider] activate = 1 I'm not sure if there's an issue upstream for transmission regarding this.