From: Sebastian Hahn Date: Mon, 19 Apr 2010 20:38:44 +0000 (+0200) Subject: Demote a warning about missing client ciphers X-Git-Tag: tor-0.2.2.12-alpha~1 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=0b82ce3eb6feeb48e2e3094de297156e536527a0;p=thirdparty%2Ftor.git Demote a warning about missing client ciphers --- diff --git a/changes/demote_no_cipher_warning b/changes/demote_no_cipher_warning new file mode 100644 index 0000000000..24fcfdd726 --- /dev/null +++ b/changes/demote_no_cipher_warning @@ -0,0 +1,5 @@ + o Minor bugfixes: + - Demote a warning that relay operators might get when someone is + trying to talk to their OrPort. It is neither the operator's fault + nor can they do anything about it. Bugfix on 0.2.0.14-alpha; fixes + bug 1364. diff --git a/src/common/tortls.c b/src/common/tortls.c index 9adbfa41f1..218f110d8c 100644 --- a/src/common/tortls.c +++ b/src/common/tortls.c @@ -746,11 +746,11 @@ tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address) /* If we reached this point, we just got a client hello. See if there is * a cipher list. */ if (!(session = SSL_get_session((SSL *)ssl))) { - log_warn(LD_NET, "No session on TLS?"); + log_info(LD_NET, "No session on TLS?"); return 0; } if (!session->ciphers) { - log_warn(LD_NET, "No ciphers on session"); + log_info(LD_NET, "No ciphers on session"); return 0; } /* Now we need to see if there are any ciphers whose presence means we're