From 6309f83b71d72548bc7c4ce7853f752f57b1a07e Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Jun 11 2019 16:07:33 +0000 Subject: import perl-IO-Socket-SSL-2.059-2.el8+1694+ef8073e1 --- diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..2d0b9fd --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/IO-Socket-SSL-2.059.tar.gz diff --git a/.perl-IO-Socket-SSL.metadata b/.perl-IO-Socket-SSL.metadata new file mode 100644 index 0000000..a614af3 --- /dev/null +++ b/.perl-IO-Socket-SSL.metadata @@ -0,0 +1 @@ +e8ea25371105bef2b17a6bcb96188adaa0a9837d SOURCES/IO-Socket-SSL-2.059.tar.gz diff --git a/SOURCES/IO-Socket-SSL-2.054-use-system-default-cipher-list.patch b/SOURCES/IO-Socket-SSL-2.054-use-system-default-cipher-list.patch new file mode 100644 index 0000000..1815c29 --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.054-use-system-default-cipher-list.patch @@ -0,0 +1,98 @@ +--- lib/IO/Socket/SSL.pm ++++ lib/IO/Socket/SSL.pm +@@ -124,10 +124,10 @@ my %DEFAULT_SSL_ARGS = ( + SSL_npn_protocols => undef, # meaning depends whether on server or client side + SSL_alpn_protocols => undef, # list of protocols we'll accept/send, for example ['http/1.1','spdy/3.1'] + +- # https://wiki.mozilla.org/Security/Server_Side_TLS, 2016/04/20 +- # "Old backward compatibility" for best compatibility +- # .. "Most ciphers that are not clearly broken and dangerous to use are supported" +- SSL_cipher_list => 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP', ++ # Use system-wide default cipher list to support use of system-wide ++ # crypto policy (#1076390, #1127577, CPAN RT#97816) ++ # https://fedoraproject.org/wiki/Changes/CryptoPolicy ++ SSL_cipher_list => 'DEFAULT', + ); + + my %DEFAULT_SSL_CLIENT_ARGS = ( +@@ -137,63 +137,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = ( + SSL_ca_file => undef, + SSL_ca_path => undef, + +- # older versions of F5 BIG-IP hang when getting SSL client hello >255 bytes +- # http://support.f5.com/kb/en-us/solutions/public/13000/000/sol13037.html +- # http://guest:guest@rt.openssl.org/Ticket/Display.html?id=2771 +- # Ubuntu worked around this by disabling TLSv1_2 on the client side for +- # a while. Later a padding extension was added to OpenSSL to work around +- # broken F5 but then IronPort croaked because it did not understand this +- # extension so it was disabled again :( +- # Firefox, Chrome and IE11 use TLSv1_2 but use only a few ciphers, so +- # that packet stays small enough. We try the same here. +- +- SSL_cipher_list => join(" ", +- +- # SSLabs report for Chrome 48/OSX. +- # This also includes the fewer ciphers Firefox uses. +- 'ECDHE-ECDSA-AES128-GCM-SHA256', +- 'ECDHE-RSA-AES128-GCM-SHA256', +- 'DHE-RSA-AES128-GCM-SHA256', +- 'ECDHE-ECDSA-CHACHA20-POLY1305', +- 'ECDHE-RSA-CHACHA20-POLY1305', +- 'ECDHE-ECDSA-AES256-SHA', +- 'ECDHE-RSA-AES256-SHA', +- 'DHE-RSA-AES256-SHA', +- 'ECDHE-ECDSA-AES128-SHA', +- 'ECDHE-RSA-AES128-SHA', +- 'DHE-RSA-AES128-SHA', +- 'AES128-GCM-SHA256', +- 'AES256-SHA', +- 'AES128-SHA', +- 'DES-CBC3-SHA', +- +- # IE11/Edge has some more ciphers, notably SHA384 and DSS +- # we don't offer the *-AES128-SHA256 and *-AES256-SHA384 non-GCM +- # ciphers IE/Edge offers because they look like a large mismatch +- # between a very strong HMAC and a comparably weak (but sufficient) +- # encryption. Similar all browsers which do SHA384 can do ECDHE +- # so skip the DHE*SHA384 ciphers. +- 'ECDHE-RSA-AES256-GCM-SHA384', +- 'ECDHE-ECDSA-AES256-GCM-SHA384', +- # 'ECDHE-RSA-AES256-SHA384', +- # 'ECDHE-ECDSA-AES256-SHA384', +- # 'ECDHE-RSA-AES128-SHA256', +- # 'ECDHE-ECDSA-AES128-SHA256', +- # 'DHE-RSA-AES256-GCM-SHA384', +- # 'AES256-GCM-SHA384', +- 'AES256-SHA256', +- # 'AES128-SHA256', +- 'DHE-DSS-AES256-SHA256', +- # 'DHE-DSS-AES128-SHA256', +- 'DHE-DSS-AES256-SHA', +- 'DHE-DSS-AES128-SHA', +- 'EDH-DSS-DES-CBC3-SHA', +- +- # Just to make sure, that we don't accidentally add bad ciphers above. +- # This includes dropping RC4 which is no longer supported by modern +- # browsers and also excluded in the SSL libraries of Python and Ruby. +- "!EXP !MEDIUM !LOW !eNULL !aNULL !RC4 !DES !MD5 !PSK !SRP" +- ) + ); + + # set values inside _init to work with perlcc, RT#95452 +--- lib/IO/Socket/SSL.pod ++++ lib/IO/Socket/SSL.pod +@@ -1019,12 +1019,8 @@ documentation (L +Date: Thu, 16 Aug 2018 14:56:23 +0200 +Subject: [PATCH] Adapt to OpenSSL 1.1.1 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +It needs patched Net-SSLeay (CPAN RT#125218). + +This patch introduces some TLSv1.3 identifiers but does not document +them. This is to let the IO-Socket-SSL maintainer to define the API. + +This is not a final patch. We need to fix failures in: + +t/npn.t +t/session_ticket.t +t/sni_verify.t + +Signed-off-by: Petr Písař +--- + lib/IO/Socket/SSL.pm | 17 +++++++++++++++-- + t/ecdhe.t | 16 +++++++++++----- + t/protocol_version.t | 4 ++-- + t/session_ticket.t | 2 ++ + 4 files changed, 30 insertions(+), 9 deletions(-) + +diff --git a/lib/IO/Socket/SSL.pm b/lib/IO/Socket/SSL.pm +index 9c81ffc..5b43467 100644 +--- a/lib/IO/Socket/SSL.pm ++++ b/lib/IO/Socket/SSL.pm +@@ -211,7 +211,8 @@ BEGIN{ + # get constants for SSL_OP_NO_* now, instead calling the related functions + # every time we setup a connection + my %SSL_OP_NO; +-for(qw( SSLv2 SSLv3 TLSv1 TLSv1_1 TLSv11:TLSv1_1 TLSv1_2 TLSv12:TLSv1_2 )) { ++for(qw( SSLv2 SSLv3 TLSv1 TLSv1_1 TLSv11:TLSv1_1 TLSv1_2 TLSv12:TLSv1_2 ++ TLSv1_3 TLSv13:TLSv1_3 )) { + my ($k,$op) = m{:} ? split(m{:},$_,2) : ($_,$_); + my $sub = "Net::SSLeay::OP_NO_$op"; + local $SIG{__DIE__}; +@@ -1836,6 +1837,7 @@ sub get_sslversion { + my $ssl = shift()->_get_ssl_object || return; + my $version = Net::SSLeay::version($ssl) or return; + return ++ $version == 0x0304 ? 'TLSv1_3' : + $version == 0x0303 ? 'TLSv1_2' : + $version == 0x0302 ? 'TLSv1_1' : + $version == 0x0301 ? 'TLSv1' : +@@ -2281,7 +2283,7 @@ sub new { + + my $ver = ''; + for (split(/\s*:\s*/,$arg_hash->{SSL_version})) { +- m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i ++ m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[123])?))$}i + or croak("invalid SSL_version specified"); + my $not = $1; + ( my $v = lc($2||$3) ) =~s{^(...)}{\U$1}; +@@ -2329,6 +2331,17 @@ sub new { + IO::Socket::SSL->error("SSL Context init failed"); + $CTX_CREATED_IN_THIS_THREAD{$ctx} = 1 if $use_threads; + ++ # There is no CTX_tlsv1_3_new(). Create TLSv1.3 only context using ++ # a flexible method. ++ if ($ver eq 'TLSv1_3') { ++ if (!Net::SSLeay::CTX_set_min_proto_version($ctx, ++ Net::SSLeay::TLS1_3_VERSION()) or ++ !Net::SSLeay::CTX_set_max_proto_version($ctx, ++ Net::SSLeay::TLS1_3_VERSION())) { ++ IO::Socket::SSL->error("TLSv1_3 context init failed"); ++ } ++ } ++ + # SSL_OP_CIPHER_SERVER_PREFERENCE + $ssl_op |= 0x00400000 if $arg_hash->{SSL_honor_cipher_order}; + +diff --git a/t/ecdhe.t b/t/ecdhe.t +index 638d82b..1b229c5 100644 +--- a/t/ecdhe.t ++++ b/t/ecdhe.t +@@ -53,12 +53,18 @@ if ( !defined $pid ) { + }; + ok( "client connected" ); + +- my $cipher = $to_server->get_cipher(); +- if ( $cipher !~m/^ECDHE-/ ) { +- notok("bad key exchange: $cipher"); +- exit; ++ my $protocol = $to_server->get_sslversion; ++ if ($protocol eq 'TLSv1_3') { ++ # ++ ok("# SKIP TLSv1.3 doesn't advertize key exchange in a chipher name"); ++ } else { ++ my $cipher = $to_server->get_cipher(); ++ if ( $cipher !~m/^ECDHE-/ ) { ++ notok("bad key exchange: $cipher"); ++ exit; ++ } ++ ok("ecdh key exchange: $cipher"); + } +- ok("ecdh key exchange: $cipher"); + + } else { ###### Server + +diff --git a/t/protocol_version.t b/t/protocol_version.t +index e3853d8..3577720 100644 +--- a/t/protocol_version.t ++++ b/t/protocol_version.t +@@ -13,7 +13,7 @@ plan skip_all => "Test::More has no done_testing" + $|=1; + + my $XDEBUG = 0; +-my @versions = qw(SSLv3 TLSv1 TLSv1_1 TLSv1_2); ++my @versions = qw(SSLv3 TLSv1 TLSv1_1 TLSv1_2 TLSv1_3); + + my $server = IO::Socket::SSL->new( + LocalAddr => '127.0.0.1', +@@ -82,7 +82,7 @@ if ($pid == 0) { + die "best protocol version server supports is $ver" if $supported{foo}; + + # Check if the OpenSSL was compiled without support for specific protocols +- for(qw(SSLv3 TLSv1 TLSv1_1)) { ++ for(qw(SSLv3 TLSv1 TLSv1_1 TLSv1_2 TLSv1_3)) { + if ( ! $check->($_,'')) { + diag("looks like OpenSSL was compiled without $_ support"); + delete $supported{$_}; +diff --git a/t/session_ticket.t b/t/session_ticket.t +index d3c15d9..bff6a86 100644 +--- a/t/session_ticket.t ++++ b/t/session_ticket.t +@@ -73,6 +73,8 @@ my $client = sub { + }; + + ++# FIXME: TLSv1.3 requires to use SSL_CTX_sess_set_new_cb() by clients instead ++# of SSL_get1_session(). Missing from Net::SSLeay. + $client->(0,0,"no initial session -> no reuse"); + $client->(0,1,"reuse with the next session and secret[0]"); + $client->(1,1,"reuse even though server changed, since they share ticket secret"); +-- +2.14.4 + diff --git a/SOURCES/IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni.t.patch b/SOURCES/IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni.t.patch new file mode 100644 index 0000000..2e2b54d --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni.t.patch @@ -0,0 +1,65 @@ +From 1d19a7d01960fd8dc00bb3929a1ffaee186470fd Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Tue, 21 Aug 2018 16:02:19 +0200 +Subject: [PATCH] Do two-way shutdown in t/sni.t +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +TLSv1.3 performs more reading and writing in SSL_accept(). If a client +disconnects after the handshake but before the server finishes +SSL_accept(), the t/sni.t test would fail because accept() could fail with +ECONNRESET. This happened randomly. + +Failed accept() lead to undef->get_servername() call that triggered +a run-time exception and that caused a client being stucked and the +test script never exited. + +This fixes both these issues. + +Signed-off-by: Petr Písař +--- + t/sni.t | 20 ++++++++++++++++++-- + 1 file changed, 18 insertions(+), 2 deletions(-) + +diff --git a/t/sni.t b/t/sni.t +index de0f06e..91206de 100644 +--- a/t/sni.t ++++ b/t/sni.t +@@ -68,15 +68,31 @@ if ( $pid == 0 ) { + + $client->verify_hostname($host,'http') or print "not "; + print "ok # client verify hostname in cert $host\n"; ++ # Shutdown TLS properly. Otherwise TLSv1.3 $server->accept() fails with ++ # ECONNRESET when a client disconnects too early. ++ $client->close('SSL_fast_shutdown' => 0); + } + exit; + } + ++# If the server dies, a client can get stuck in read(2) while Perl interpreter ++# is collecting children status in the die handler using wait4(2). ++$SIG{__DIE__} = sub { ++ STDERR->print("Server died. Killing client with $pid PID.\n"); ++ kill(9, $pid); ++}; + for my $host (@tests) { +- my $csock = $server->accept or print "not "; +- print "ok # server accept\n"; ++ my $csock = $server->accept; ++ if (!$csock) { ++ print "not ok # server accept SSL_ERROR='$SSL_ERROR', errno='$!'"; ++ } else { ++ print "ok # server accept\n"; ++ } + my $name = $csock->get_servername; + print "not " if ! $name or $name ne $host; + print "ok # server got SNI name $host\n"; ++ # Shutdown TLS properly. Otherwise TLSv1.3 $server->accept() fails with ++ # ECONNRESET when a client disconnects too early. ++ $csock->close('SSL_fast_shutdown' => 0); + } + wait; +-- +2.14.4 + diff --git a/SOURCES/IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni_verify.t.patch b/SOURCES/IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni_verify.t.patch new file mode 100644 index 0000000..ad3d2df --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni_verify.t.patch @@ -0,0 +1,47 @@ +From 84a3bc6c273977bcd4b709e0d9a3d9fcdd58e36d Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Fri, 17 Aug 2018 14:46:33 +0200 +Subject: [PATCH] Do two-way shutdown in t/sni_verify.t +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +OpenSSL 1.1.1-pre7 sigipipes TLSv1.3 server if client does not +shutdown TLS properly. + + +Signed-off-by: Petr Písař +--- + t/sni_verify.t | 10 ++++++++++ + 1 file changed, 10 insertions(+) + +diff --git a/t/sni_verify.t b/t/sni_verify.t +index b3b299b..b5ac4bd 100644 +--- a/t/sni_verify.t ++++ b/t/sni_verify.t +@@ -71,6 +71,13 @@ if ( $pid == 0 ) { + + $client->verify_hostname($host,'http') or print "not "; + print "ok # client verify hostname in cert $host\n"; ++ ++ if ($client) { ++ # Shutdown TLS properly. Otherwise TLSv1.3 server will receive SIGPIPE ++ # in SSL_accept() and dies. ++ # . ++ $client->close('SSL_fast_shutdown' => 0); ++ } + } + exit; + } +@@ -81,5 +88,8 @@ for my $host (@tests) { + my $name = $csock->get_servername; + print "not " if ! $name or $name ne $host; + print "ok # server got SNI name $host\n"; ++ if ($csock) { ++ $csock->close('SSL_fast_shutdown' => 0); ++ } + } + wait; +-- +2.14.4 + diff --git a/SOURCES/IO-Socket-SSL-2.059-Exclude-TLSv1.3-from-t-session_ticket.t.patch b/SOURCES/IO-Socket-SSL-2.059-Exclude-TLSv1.3-from-t-session_ticket.t.patch new file mode 100644 index 0000000..8b13a63 --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.059-Exclude-TLSv1.3-from-t-session_ticket.t.patch @@ -0,0 +1,59 @@ +From c332d19048735e32e2754685fa3c8654ca068b78 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Tue, 21 Aug 2018 12:32:39 +0200 +Subject: [PATCH] Exclude TLSv1.3 from t/session_ticket.t +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +The test fails with OpenSSL 1.1.1 because SSL_get1_session() is not +reliable with TLSv1.3. A proper resumption support would need +migration to SSL_CTX_sess_set_new_cb() API. + +This patch also performs full SSL_shutdown in the test becasue +SSL_get1_session() manual documents that a connection must be properly +SSL_shutdowned, otherwise the session will be removed from the +(internal) session cache. + +Signed-off-by: Petr Písař +--- + t/session_ticket.t | 9 +++++++-- + 1 file changed, 7 insertions(+), 2 deletions(-) + +diff --git a/t/session_ticket.t b/t/session_ticket.t +index bff6a86..69cbc96 100644 +--- a/t/session_ticket.t ++++ b/t/session_ticket.t +@@ -69,7 +69,7 @@ my $client = sub { + diag("connect to $i: ". + ($cl ? "success reuse=$reuse" : "error: $!,$SSL_ERROR")); + is($reuse,$expect_reuse,$desc); +- close($cl); ++ $cl->close('SSL_fast_shutdown' => 0); + }; + + +@@ -123,6 +123,11 @@ sub _server { + SSL_verify_mode => SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, + SSL_ticket_keycb => $get_ticket_key, + SSL_session_id_context => 'foobar', ++ SSL_version => 'SSLv23:!TLSv1_3', # TLSv1.3 sends session tickes after ++ # a handshake, this SSL_get1_session() is not reliable anymore. ++ # Exclude TLSv1.3 from tests. Proper TLSv1.3 session resumption ++ # will need SSL_CTX_sess_set_new_cb(). ++ # + ) or die "failed to create SSL context: $SSL_ERROR"; + } + +@@ -158,7 +163,7 @@ sub _server { + print "rotate secrets\n"; + push @secrets, shift(@secrets); + } +- close($cl); ++ $cl->close('SSL_fast_shutdown' => 0); + alarm(0); + last; + } +-- +2.14.4 + diff --git a/SOURCES/IO-Socket-SSL-2.059-Fix-building-on-systems-without-TLSv1.3-support.patch b/SOURCES/IO-Socket-SSL-2.059-Fix-building-on-systems-without-TLSv1.3-support.patch new file mode 100644 index 0000000..4613520 --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.059-Fix-building-on-systems-without-TLSv1.3-support.patch @@ -0,0 +1,41 @@ +From 12ff43c81b10446bd74cc719f0a6913040598c58 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Tue, 21 Aug 2018 16:34:39 +0200 +Subject: [PATCH] Fix building on systems without TLSv1.3 support +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +If OpenSSL does not support TLSv1.3, Net::SSLeay does not have +TLS1_3_VERSION() and t/protocol_version.t fails with: + + # Failed test 'Your vendor has not defined SSLeay macro TLS1_3_VERSION at /home/test/fedora/perl-IO-Socket-SSL/IO-Socket-SSL-2.059/blib/lib/IO/Socket/SSL.pm line 2337. + # ' + # at ./t/testlib.pl line 39. + +This patch fixes creating IO::Socket:SSL context for TLSv1.3 by +checking whether it's supported by Net::SSLeay. + +Signed-off-by: Petr Písař +--- + lib/IO/Socket/SSL.pm | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/lib/IO/Socket/SSL.pm b/lib/IO/Socket/SSL.pm +index 5b43467..7138ab0 100644 +--- a/lib/IO/Socket/SSL.pm ++++ b/lib/IO/Socket/SSL.pm +@@ -2334,6 +2334,10 @@ sub new { + # There is no CTX_tlsv1_3_new(). Create TLSv1.3 only context using + # a flexible method. + if ($ver eq 'TLSv1_3') { ++ if (!eval {Net::SSLeay::TLS1_3_VERSION()}) { ++ return IO::Socket::SSL->_internal_error( ++ "SSL Version $ver not supported",9); ++ } + if (!Net::SSLeay::CTX_set_min_proto_version($ctx, + Net::SSLeay::TLS1_3_VERSION()) or + !Net::SSLeay::CTX_set_max_proto_version($ctx, +-- +2.14.4 + diff --git a/SOURCES/IO-Socket-SSL-2.059-NPN-is-unavailable-in-TLSv1.3.patch b/SOURCES/IO-Socket-SSL-2.059-NPN-is-unavailable-in-TLSv1.3.patch new file mode 100644 index 0000000..6b93df3 --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.059-NPN-is-unavailable-in-TLSv1.3.patch @@ -0,0 +1,49 @@ +From 94b0b52f05911bd8cfe579406248c8afe36004d7 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Fri, 17 Aug 2018 15:14:40 +0200 +Subject: [PATCH] NPN is unavailable in TLSv1.3 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +TLSv1.3 does not support NPN. Application can use ALPN. This caused +t/npn.t failures when TLSv1.3 was negotiated. This patch disables +TLSv1.3 in the test. + + + +Signed-off-by: Petr Písař +--- + lib/IO/Socket/SSL.pod | 2 +- + t/npn.t | 2 ++ + 2 files changed, 3 insertions(+), 1 deletion(-) + +diff --git a/lib/IO/Socket/SSL.pod b/lib/IO/Socket/SSL.pod +index 95401aa..363901b 100644 +--- a/lib/IO/Socket/SSL.pod ++++ b/lib/IO/Socket/SSL.pod +@@ -1336,7 +1336,7 @@ as an array ref. + See also method C. + + Next Protocol Negotiation (NPN) is available with Net::SSLeay 1.46+ and +-openssl-1.0.1+. ++openssl-1.0.1+. NPN is unavailable in TLSv1.3 protocol. + To check support you might call C<< IO::Socket::SSL->can_npn() >>. + If you use this option with an unsupported Net::SSLeay/OpenSSL it will + throw an error. +diff --git a/t/npn.t b/t/npn.t +index 8992a77..6ee6ca6 100644 +--- a/t/npn.t ++++ b/t/npn.t +@@ -25,6 +25,8 @@ my $addr = '127.0.0.1'; + my $server = IO::Socket::SSL->new( + LocalAddr => $addr, + Listen => 2, ++ SSL_version => 'SSLv23:!TLSv1_3', # NPN does not exist in TLSv1.3 ++ # https://github.com/openssl/openssl/issues/3665 + SSL_cert_file => 'certs/server-cert.pem', + SSL_key_file => 'certs/server-key.pem', + SSL_npn_protocols => [qw(one two)], +-- +2.14.4 + diff --git a/SOURCES/IO-Socket-SSL-2.059-use-system-default-SSL-version.patch b/SOURCES/IO-Socket-SSL-2.059-use-system-default-SSL-version.patch new file mode 100644 index 0000000..25d7ffd --- /dev/null +++ b/SOURCES/IO-Socket-SSL-2.059-use-system-default-SSL-version.patch @@ -0,0 +1,36 @@ +--- lib/IO/Socket/SSL.pm ++++ lib/IO/Socket/SSL.pm +@@ -116,7 +116,7 @@ my $algo2digest = do { + # global defaults + my %DEFAULT_SSL_ARGS = ( + SSL_check_crl => 0, +- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 as broken ++ SSL_version => '', + SSL_verify_callback => undef, + SSL_verifycn_scheme => undef, # fallback cn verification + SSL_verifycn_publicsuffix => undef, # fallback default list verification +@@ -2279,7 +2279,7 @@ sub new { + + my $ssl_op = $DEFAULT_SSL_OP; + +- my $ver; ++ my $ver = ''; + for (split(/\s*:\s*/,$arg_hash->{SSL_version})) { + m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i + or croak("invalid SSL_version specified"); +--- lib/IO/Socket/SSL.pod ++++ lib/IO/Socket/SSL.pod +@@ -993,11 +993,12 @@ protocol to the specified version. + All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can + also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires + recent versions of Net::SSLeay and openssl. ++The default SSL_version is defined by the underlying cryptographic library. + + Independent from the handshake format you can limit to set of accepted SSL + versions by adding !version separated by ':'. + +-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the ++For example, 'SSLv23:!SSLv3:!SSLv2' means that the + handshake format is compatible to SSL2.0 and higher, but that the successful + handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because + both of these versions have serious security issues and should not be used diff --git a/SPECS/perl-IO-Socket-SSL.spec b/SPECS/perl-IO-Socket-SSL.spec new file mode 100644 index 0000000..3bb16f7 --- /dev/null +++ b/SPECS/perl-IO-Socket-SSL.spec @@ -0,0 +1,1511 @@ +Name: perl-IO-Socket-SSL +Version: 2.059 +Release: 2%{?dist} +Summary: Perl library for transparent SSL +License: GPL+ or Artistic +URL: https://metacpan.org/release/IO-Socket-SSL +Source0: https://cpan.metacpan.org/modules/by-module/IO/IO-Socket-SSL-%{version}.tar.gz +Patch0: IO-Socket-SSL-2.054-use-system-default-cipher-list.patch +Patch1: IO-Socket-SSL-2.059-use-system-default-SSL-version.patch +# Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay, bug #1610017, +# CPAN RT#126899 +Patch2: IO-Socket-SSL-2.059-Adapt-to-OpenSSL-1.1.1.patch +# Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay, bug #1610017, +# CPAN RT#126899 +Patch3: IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni_verify.t.patch +# Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay, bug #1610017, +# CPAN RT#126899 +Patch4: IO-Socket-SSL-2.059-NPN-is-unavailable-in-TLSv1.3.patch +# Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay, bug #1610017, +# CPAN RT#126899 +Patch5: IO-Socket-SSL-2.059-Exclude-TLSv1.3-from-t-session_ticket.t.patch +# Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay, bug #1610017, +# CPAN RT#126899 +Patch6: IO-Socket-SSL-2.059-Do-two-way-shutdown-in-t-sni.t.patch +# Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay, bug #1610017, +# CPAN RT#126899 +Patch7: IO-Socket-SSL-2.059-Fix-building-on-systems-without-TLSv1.3-support.patch +BuildArch: noarch +# Module Build +BuildRequires: coreutils +BuildRequires: findutils +BuildRequires: make +BuildRequires: perl-generators +BuildRequires: perl-interpreter +BuildRequires: perl(ExtUtils::MakeMaker) +# Module Runtime +BuildRequires: openssl >= 0.9.8 +BuildRequires: perl(Carp) +BuildRequires: perl(Config) +BuildRequires: perl(constant) +BuildRequires: perl(Errno) +BuildRequires: perl(Exporter) +BuildRequires: perl(HTTP::Tiny) +BuildRequires: perl(IO::Socket) +BuildRequires: perl(IO::Socket::INET6) >= 2.62 +BuildRequires: perl(Net::SSLeay) >= 1.46 +BuildRequires: perl(Scalar::Util) +BuildRequires: perl(Socket) +BuildRequires: perl(Socket6) +BuildRequires: perl(strict) +BuildRequires: perl(vars) +BuildRequires: perl(warnings) +# Test Suite +BuildRequires: perl(Data::Dumper) +BuildRequires: perl(File::Temp) +BuildRequires: perl(FindBin) +BuildRequires: perl(IO::Select) +BuildRequires: perl(IO::Socket::INET) +BuildRequires: perl(Test::More) >= 0.88 +BuildRequires: perl(utf8) +BuildRequires: procps +# Runtime +Requires: perl(:MODULE_COMPAT_%(eval "`perl -V:version`"; echo $version)) +Requires: openssl >= 0.9.8 +Requires: perl(Config) +Requires: perl(HTTP::Tiny) + +# Use IO::Socket::IP for IPv6 support where available, else IO::Socket::INET6 +%if 0%{?fedora} > 15 || 0%{?rhel} > 6 +BuildRequires: perl(IO::Socket::IP) >= 0.20, perl(Socket) >= 1.95 +Requires: perl(IO::Socket::IP) >= 0.20, perl(Socket) >= 1.95 +%else +Requires: perl(IO::Socket::INET6) >= 2.62, perl(Socket6) +%endif + +# IDN back-ends: URI::_idna (from URI ≥ 1.50) is preferred +# but Net::IDN::Encode (next pref) and Net::LibIDN are also tested +BuildRequires: perl(Net::IDN::Encode) +BuildRequires: perl(Net::LibIDN) +%if 0%{?fedora:1} || 0%{?rhel} > 6 +BuildRequires: perl(URI::_idna) +Requires: perl(URI::_idna) +%else +Requires: perl(Net::IDN::Encode) +%endif + +%description +This module is a true drop-in replacement for IO::Socket::INET that +uses SSL to encrypt data before it is transferred to a remote server +or client. IO::Socket::SSL supports all the extra features that one +needs to write a full-featured SSL client or server application: +multiple SSL contexts, cipher selection, certificate verification, and +SSL version selection. As an extra bonus, it works perfectly with +mod_perl. + +%prep +%setup -q -n IO-Socket-SSL-%{version} + +# Use system-wide default cipher list to support use of system-wide +# crypto policy (#1076390, #1127577, CPAN RT#97816) +# https://fedoraproject.org/wiki/Changes/CryptoPolicy +%patch0 + +# Use system-default SSL version too +%patch1 + +# OpensSSL 1.1.1 +%patch2 -p1 +%patch3 -p1 +%patch4 -p1 +%patch5 -p1 +%patch6 -p1 +%patch7 -p1 + +%build +NO_NETWORK_TESTING=1 perl Makefile.PL INSTALLDIRS=vendor +make %{?_smp_mflags} + +%install +make pure_install DESTDIR=%{buildroot} +find %{buildroot} -type f -name .packlist -delete +%{_fixperms} -c %{buildroot} + +%check +make test + +%files +%doc BUGS Changes README docs/ certs/ example/ +%dir %{perl_vendorlib}/IO/ +%dir %{perl_vendorlib}/IO/Socket/ +%doc %{perl_vendorlib}/IO/Socket/SSL.pod +%{perl_vendorlib}/IO/Socket/SSL.pm +%{perl_vendorlib}/IO/Socket/SSL/ +%{_mandir}/man3/IO::Socket::SSL.3* +%{_mandir}/man3/IO::Socket::SSL::Intercept.3* +%{_mandir}/man3/IO::Socket::SSL::PublicSuffix.3* +%{_mandir}/man3/IO::Socket::SSL::Utils.3* + +%changelog +* Tue Aug 21 2018 Petr Pisar - 2.059-2 +- Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay (bug #1610017) + +* Thu Aug 16 2018 Paul Howarth - 2.059-1 +- Update to 2.059 (bug #1610017) + - Fix memory leak when CRLs are used (CPAN RT#125867) + - Fix memory leak when using stop_SSL and threads + (https://rt.cpan.org/Ticket/Display.html?id=125867#txn-1797132) + +* Thu Jul 19 2018 Paul Howarth - 2.058-1 +- Update to 2.058 + - Fix memory leak that occured with explicit stop_SSL in connection with + non-blocking sockets or timeout (CPAN RT#125867) + - Fix redefine warnings in case Socket6 is installed but neither + IO::Socket::IP nor IO::Socket::INET6 (CPAN RT#124963) + - IO::Socket::SSL::Intercept - optional 'serial' argument can be starting + number or callback to create serial number based on the original certificate + - New function get_session_reused to check if a session got reused + - IO::Socket::SSL::Utils::CERT_asHash: fingerprint_xxx now set to the correct + value + - Fix t/session_ticket.t: It failed with OpenSSL 1.1.* since this version + expects the extKeyUsage of clientAuth in the client cert also to be allowed + by the CA if CA uses extKeyUsage + +* Fri Jul 13 2018 Fedora Release Engineering - 2.056-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild + +* Thu Jun 28 2018 Jitka Plesnikova - 2.056-2 +- Perl 5.28 rebuild + +* Mon Feb 19 2018 Paul Howarth - 2.056-1 +- Update to 2.056 + - Intercept: Fix creation of serial number (basing it on binary digest + instead of treating hex fingerprint as binary), allow use of own serial + numbers again + - t/io-socket-ip.t: Skip test if no IPv6 support on system (CPAN RT#124464) + - Update PublicSuffix + +* Thu Feb 15 2018 Paul Howarth - 2.055-1 +- Update to 2.055 + - Use SNI also if hostname was given all-uppercase + - Utils::CERT_create: Don't add authority key for issuer since Chrome does + not like this + - Intercept: + - Change behavior of code-based cache to better support synchronizing + within multiprocess/threaded set-ups + - Don't use counter for serial number but somehow base it on original + certificate in order to avoid conflicts with reuse of serial numbers + after restart + - Better support platforms without IPv6 (CPAN RT#124431) + - Spelling fixes in documentation (CPAN RT#124306) + +* Thu Feb 08 2018 Fedora Release Engineering - 2.054-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild + +* Mon Jan 22 2018 Paul Howarth - 2.054-1 +- Update to 2.054 + - Small behavior fixes + - If SSL_fingerprint is used and matches, don't check for OCSP + - Utils::CERT_create: Small fixes to properly specific purpose, ability to + use predefined complex purpose but disable some features + - Update PublicSuffix + - Updates for documentation, especially regarding pitfalls with forking or + using non-blocking sockets, spelling fixes + - Test fixes and improvements + - Stability improvements for live tests + - Regenerate certificates in certs/ and make sure they are limited to the + correct purpose; check in program used to generate certificates + - Adjust tests since certificates have changed and some tests used + certificates intended for client authentication as server certificates, + which now no longer works + +* Mon Oct 23 2017 Paul Howarth - 2.052-1 +- Update to 2.052 + - Disable NPN support if LibreSSL ≥ 2.6.1 is detected since they've replaced + the functions with dummies instead of removing NPN completly or setting + OPENSSL_NO_NEXTPROTONEG + - t/01loadmodule.t shows more output helpful in debugging problems + - Update fingerprints for external tests + - Update documentation to make behavior of syswrite more clear + +* Tue Sep 5 2017 Paul Howarth - 2.051-1 +- Update to 2.051 + - syswrite: If SSL_write sets SSL_ERROR_SYSCALL but not $! (as seen with + OpenSSL 1.1.0 on Windows), set $! to EPIPE to propagate a useful error up + (GH#62) + +* Fri Aug 18 2017 Paul Howarth - 2.050-1 +- Update to 2.050 + - Removed unnecessary settings of SSL_version and SSL_cipher_list from tests + - protocol_version.t can now deal when TLS 1.0 and/or TLS 1.1 are not + supported, as is the case with openssl versions in latest Debian (buster) + +* Thu Jul 27 2017 Fedora Release Engineering - 2.049-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild + +* Mon Jun 12 2017 Paul Howarth - 2.049-1 +- Update to 2.049 + - Fixed problem caused by typo in the context of session cache (GH#60) + - Updated PublicSuffix information from publicsuffix.org + +* Mon Jun 05 2017 Jitka Plesnikova - 2.048-2 +- Perl 5.26 rebuild + +* Mon Apr 17 2017 Paul Howarth - 2.048-1 +- Update to 2.048 + - Fixed small memory leaks during destruction of socket and context + (CPAN RT#120643) +- Drop support for EOL distributions prior to F-13 + - Drop BuildRoot: and Group: tags + - Drop explicit buildroot cleaning in %%install section + - Drop explicit %%clean section + +* Fri Feb 17 2017 Paul Howarth - 2.047-1 +- Update to 2.047 + - Better fix for problem which 2.046 tried to fix but broke LWP that way +- Update patches as needed + +* Thu Feb 16 2017 Paul Howarth - 2.046-1 +- Update to 2.046 + - Clean up everything in DESTROY and make sure to start with a fresh + %%{*self} in configure_SSL because it can happen that a GLOB gets used + again without calling DESTROY + (https://github.com/noxxi/p5-io-socket-ssl/issues/56) +- Update patches as needed + +* Tue Feb 14 2017 Paul Howarth - 2.045-1 +- Update to 2.045 + - Fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL + objects (GH#55) + - Optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD if + perl is compiled without thread support + - Small fix in t/protocol_version.t to use older versions of Net::SSLeay with + openssl build without SSLv3 support + - When setting SSL_keepSocketOnError to true the socket will not be closed on + fatal error (GH#53, modified) +- Update patches as needed + +* Sat Feb 11 2017 Fedora Release Engineering - 2.044-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild + +* Thu Jan 26 2017 Paul Howarth - 2.044-1 +- Update to 2.044 + - Protect various 'eval'-based capability detections at startup with a + localized __DIE__ handler; this way, dynamically requiring IO::Socket::SSL + as done by various third party software should cause less problems even if + there is a global __DIE__ handler that does not properly deal with 'eval' +- Update patches as needed + +* Fri Jan 6 2017 Paul Howarth - 2.043-1 +- Update to 2.043 + - Enable session ticket callback with Net::SSLeay ≥ 1.80 + - Make t/session_ticket.t work with OpenSSL 1.1.0; with this version the + session no longer gets reused if it was not properly closed, which is now + done using an explicit close by the client +- Update patches as needed + +* Wed Jan 4 2017 Paul Howarth - 2.041-1 +- Update to 2.041 + - Leave session ticket callback off for now until the needed patch is + included in Net::SSLeay (see + https://rt.cpan.org/Ticket/Display.html?id=116118#txn-1696146) +- Update patches as needed + +* Sun Dec 18 2016 Paul Howarth - 2.040-1 +- Update to 2.040 + - Fix detection of default CA path for OpenSSL 1.1.x + - Utils::CERT_asHash now includes the signature algorithm used + - Utils::CERT_asHash can now deal with large serial numbers +- Update patches as needed + +* Mon Nov 21 2016 Paul Howarth - 2.039-1 +- Update to 2.039 + - OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1 + on EOF without proper SSL shutdown; since it looks like that this behavior + will be kept at least for 1.1.1+, adapt to the changed API by treating + errno=NOERR on SSL_ERROR_SYSCALL as EOF +- Update patches as needed + +* Mon Sep 19 2016 Paul Howarth - 2.038-1 +- Update to 2.038 + - Restrict session ticket callback to Net::SSLeay 1.79+ since version before + contains bug; add test for session reuse + - Extend SSL fingerprint to pubkey digest, i.e. 'sha1$pub$xxxxxx....' + - Fix t/external/ocsp.t to use different server (under my control) to check + OCSP stapling +- Update patches as needed + +* Tue Aug 23 2016 Paul Howarth - 2.037-1 +- Update to 2.037 + - Disable OCSP support when Net::SSLeay 1.75..1.77 is used (CPAN RT#116795) + - Fix session cache del_session: it freed the session but did not properly + remove it from the cache; further reuse caused crash +- Update patches as needed + +* Thu Aug 11 2016 Paul Howarth - 2.035-1 +- Update to 2.035 + - Fixes for issues introduced in 2.034 + - Return with error in configure_SSL if context creation failed; this + might otherwise result in a segmentation fault later + - Apply builtin defaults before any (user configurable) global settings + (i.e. done with set_defaults, set_default_context...) so that builtins + don't replace user settings +- Update patches as needed + +* Mon Aug 8 2016 Paul Howarth - 2.034-1 +- Update to 2.034 + - Move handling of global SSL arguments into creation of context, so that + these get also applied when creating a context only +- Update patches as needed + +* Sat Jul 16 2016 Paul Howarth - 2.033-1 +- Update to 2.033 + - Support for session ticket reuse over multiple contexts and processes (if + supported by Net::SSLeay) + - Small optimizations, like saving various Net::SSLeay constants into + variables and access variables instead of calling the constant sub all the + time + - Make t/dhe.t work with openssl 1.1.0 +- Update patches as needed + +* Tue Jul 12 2016 Paul Howarth - 2.032-1 +- Update to 2.032 + - Set session id context only on the server side; even if the documentation + for SSL_CTX_set_session_id_context makes clear that this function is server + side only, it actually affects handling of session reuse on the client side + too and can result in error "SSL3_GET_SERVER_HELLO:attempt to reuse session + in different context" at the client + +* Fri Jul 8 2016 Paul Howarth - 2.031-1 +- Update to 2.031 + - Utils::CERT_create - don't add given extensions again if they were already + added; Firefox croaks with sec_error_extension_value_invalid if (specific?) + extensions are given twice + - Assume that Net::SSLeay::P_PKCS12_load_file will return the CA certificates + with the reverse order as in the PKCS12 file, because that's what it does + - Support for creating ECC keys in Utils once supported by Net::SSLeay + - Remove internal sub session_cache and access cache directly (faster) +- Update patches as needed + +* Tue Jun 28 2016 Paul Howarth - 2.029-1 +- Update to 2.029 + - Add del_session method to session cache + - Use SSL_session_key as the real key for the cache and not some derivate of + it, so that it works to remove the entry using the same key +- BR: perl-generators + +* Mon May 16 2016 Jitka Plesnikova - 2.027-2 +- Perl 5.24 rebuild + +* Thu Apr 21 2016 Paul Howarth - 2.027-1 +- Update to 2.027 + - Updated Changes file for 2.026 + +* Wed Apr 20 2016 Paul Howarth - 2.026-1 +- Update to 2.026 + - Upstream's default cipher lists updated (we use system default though) +- Update patches as needed + +* Mon Apr 4 2016 Paul Howarth - 2.025-1 +- Update to 2.025 + - Resolved memleak if SSL_crl_file was used (CPAN RT#113257, CPAN RT#113530) +- Simplify find command using -delete + +* Sun Feb 7 2016 Paul Howarth - 2.024-1 +- Update to 2.024 + - Work around issue where the connect fails on systems having only a loopback + interface and where IO::Socket::IP is used as super class (default when + available) +- Update patches as needed + +* Thu Feb 04 2016 Fedora Release Engineering - 2.023-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild + +* Sat Jan 30 2016 Paul Howarth - 2.023-1 +- Update to 2.023 + - OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS + connection was not fully established, which somehow resulted in + Net::SSLeay::shutdown returning 0 (i.e. keep trying) and hence an endless + loop; it will now ignore this result in case the TLS connection was not + yet established and consider the TLS connection closed instead +- Update patches as needed + +* Thu Dec 10 2015 Paul Howarth - 2.022-1 +- Update to 2.022 + - Fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash + (CPAN RT#110253) + +* Thu Dec 3 2015 Paul Howarth - 2.021-1 +- Update to 2.021 + - Fixes for documentation and typos + - Update PublicSuffix with latest version from publicsuffix.org +- Update patches as needed + +* Mon Sep 21 2015 Paul Howarth - 2.020-1 +- Update to 2.020 + - Support multiple directories in SSL_ca_path (CPAN RT#106711); directories + can be given as array or as string with a path separator + - Typos fixed (https://github.com/noxxi/p5-io-socket-ssl/pull/34) +- Update patches as needed + +* Tue Sep 1 2015 Paul Howarth - 2.019-1 +- Update to 2.019 + - Work around different behavior of getnameinfo from Socket and Socket6 by + using a different wrapper depending on which module is used for IPv6 +- Update patches as needed + +* Mon Aug 31 2015 Paul Howarth - 2.018-1 +- Update to 2.018 + - Checks for readability of files/dirs for certificates and CA no longer use + -r because this is not safe when ACLs are used (CPAN RT#106295) + - New method sock_certificate similar to peer_certificate (CPAN RT#105733) + - get_fingerprint can now take optional certificate as argument and compute + the fingerprint of it; useful in connection with sock_certificate + - Check for both EWOULDBLOCK and EAGAIN since these codes are different on + some platforms (CPAN RT#106573) + - Enforce default verification scheme if nothing was specified, i.e. no + longer just warn but accept; if really no verification is wanted, a scheme + of 'none' must be explicitly specified + - Support different cipher suites per SNI hosts + - startssl.t failed on darwin with old openssl since server requested client + certificate but offered also anon ciphers (CPAN RT#106687) +- Update patches as needed + +* Thu Jun 18 2015 Fedora Release Engineering - 2.016-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild + +* Tue Jun 09 2015 Jitka Plesnikova - 2.016-2 +- Perl 5.22 rebuild + +* Sun Jun 7 2015 Paul Howarth - 2.016-1 +- Update to 2.016 + - Add flag X509_V_FLAG_TRUSTED_FIRST by default if available in OpenSSL + (since 1.02) and available with Net::SSLeay (CPAN RT#104759) + - Work around hanging prompt() with older perl in Makefile.PL + (CPAN RT#104731) + - Make t/memleak_bad_handshake.t work on cygwin and other systems having + /proc/pid/statm (CPAN RT#104659) + - Add better debugging + +* Sat Jun 06 2015 Jitka Plesnikova - 2.015-2 +- Perl 5.22 rebuild + +* Thu May 14 2015 Paul Howarth - 2.015-1 +- Update to 2.015 + - Work around problem with IO::Socket::INET6 on Windows, by explicitly using + Domain AF_INET in the tests (CPAN RT#104226) + +* Tue May 5 2015 Paul Howarth - 2.014-1 +- Update to 2.014 + - Utils::CERT_create - work around problems with authorityInfoAccess, where + OpenSSL i2v does not create the same string as v2i expects + - Intercept - don't clone some specific extensions that only make sense with + the original certificate + +* Fri May 1 2015 Paul Howarth - 2.013-1 +- Update to 2.013 + - Assign severities to internal error handling and make sure that follow-up + errors like "configuration failed" or "certificate verify error" don't + replace more specific "hostname verification failed" when reporting in + sub errstr/$SSL_ERROR (CPAN RT#103423) + - Enhanced documentation (https://github.com/noxxi/p5-io-socket-ssl/pull/26) + +* Mon Feb 2 2015 Paul Howarth - 2.012-1 +- Update to 2.012 + - Fix t/ocsp.t in case no HTTP::Tiny is installed + +* Sun Feb 1 2015 Paul Howarth - 2.011-1 +- Update to 2.011 + - Fix t/ocsp.t - don't count on revoked.grc.com using OCSP stapling + (CPAN RT#101855) + - Added option 'purpose' to Utils::CERT_create to get better control of the + certificate's purpose; default is 'server,client' for non-CA (contrary to + only 'server' before) + - Removed RC4 from default cipher suites on the server side + (https://github.com/noxxi/p5-io-socket-ssl/issues/22) + - Refactoring of some tests using Test::More +- Note that this package still uses system-default cipher and SSL versions, + which may have RC4 enabled +- Update patches as needed + +* Thu Jan 15 2015 Paul Howarth - 2.010-1 +- Update to 2.010 + - New options SSL_client_ca_file and SSL_client_ca to let the server send the + list of acceptable CAs for the client certificate + - t/protocol_version.t - fix in case SSLv3 is not supported in Net::SSLeay + (CPAN RT#101485) + +* Mon Jan 12 2015 Paul Howarth - 2.009-1 +- Update to 2.009 + - Remove util/analyze.pl; this tool is now together with other SSL tools at + https://github.com/noxxi/p5-ssl-tools + - Added ALPN support (needs OpenSSL1.02, Net::SSLeay 1.56+) (CPAN RT#101452) + +* Thu Dec 18 2014 Paul Howarth - 2.008-1 +- Update to 2.008 + - Work around recent OCSP verification errors for revoked.grc.com (badly + signed OCSP response, Firefox also complains about it) in test + t/external/ocsp.t + - util/analyze.pl - report more details about preferred cipher for specific + TLS versions + +* Thu Nov 27 2014 Paul Howarth - 2.007-1 +- Update to 2.007 + - Make getline/readline fall back to super class if class is not sslified + yet, i.e. behave the same as sysread, syswrite etc. (CPAN RT#100529) + +* Sun Nov 23 2014 Paul Howarth - 2.006-1 +- Update to 2.006 + - Make SSLv3 available even if the SSL library disables it by default in + SSL_CTX_new (like done in LibreSSL); default will stay to disable SSLv3 + so this will be only done when setting SSL_version explicitly + - Fix possible segmentation fault when trying to use an invalid certificate + - Use only the ICANN part of the default public suffix list and not the + private domains; this makes existing exceptions for s3.amazonaws.com and + googleapis.com obsolete + - Fix t/protocol_version.t to deal with OpenSSL installations that are + compiled without SSLv3 support + - Make (hopefully) non-blocking work on windows by using EWOULDBLOCK instead + of EAGAIN; while this is the same on UNIX it is different on Windows and + socket operations return there (WSA)EWOULDBLOCK and not EAGAIN + - Enable non-blocking tests on Windows too + - Make PublicSuffix::_default_data thread safe + - Update PublicSuffix with latest list from publicsuffix.org +- Note that this package still uses system-default cipher and SSL versions, + which may have SSL3.0 enabled +- Classify buildreqs by usage + +* Wed Oct 22 2014 Paul Howarth - 2.002-1 +- Update to 2.002 + - Fix check for (invalid) IPv4 when validating hostname against certificate; + do not use inet_aton any longer because it can cause DNS lookups for + malformed IP (CPAN RT#99448) + - Update PublicSuffix with latest version from publicsuffix.org - lots of new + top level domains + - Add exception to PublicSuffix for s3.amazonaws.com (CPAN RT#99702) + +* Tue Oct 21 2014 Paul Howarth - 2.001-1 +- Update to 2.001 + - Add SSL_OP_SINGLE_(DH|ECDH)_USE to default options to increase PFS security + - Update external tests with currently expected fingerprints of hosts + - Some fixes to make it still work on 5.8.1 + +* Thu Oct 16 2014 Paul Howarth - 2.000-1 +- Update to 2.000 + - Consider SSL3.0 as broken because of POODLE and disable it by default + - Skip live tests without asking if environment NO_NETWORK_TESTING is set + - Skip tests that require fork on non-default windows setups without proper + fork (https://github.com/noxxi/p5-io-socket-ssl/pull/18) +- Note that this package still uses system-default cipher and SSL versions, + which may have SSL3.0 enabled + +* Fri Oct 10 2014 Paul Howarth - 1.999-1 +- Update to 1.999 + - Make sure we don't use version 0.30 of IO::Socket::IP + - Make sure that PeerHost is checked in all places where PeerAddr is checked, + because these are synonyms and IO::Socket::IP prefers PeerHost while others + prefer PeerAddr; also accept PeerService additionally to PeerPort + (https://github.com/noxxi/p5-io-socket-ssl/issues/16) + - Add ability to use client certificates and to overwrite hostname with + util/analyze-ssl.pl + +* Mon Sep 22 2014 Paul Howarth - 1.998-1 +- Update to 1.998 + - Make client authentication work at the server side when SNI is in by use + having CA path and other settings in all SSL contexts instead of only the + main one (https://github.com/noxxi/p5-io-socket-ssl/pull/15) + +* Thu Aug 28 2014 Jitka Plesnikova - 1.997-4 +- Perl 5.20 rebuild + +* Thu Aug 7 2014 Paul Howarth - 1.997-3 +- Use system-default SSL version too + +* Thu Aug 7 2014 Paul Howarth - 1.997-2 +- Use system-wide default cipher list to support use of system-wide + crypto policy (#1076390, #1127577, CPAN RT#97816) + https://fedoraproject.org/wiki/Changes/CryptoPolicy + +* Mon Jul 14 2014 Paul Howarth - 1.997-1 +- Update to 1.997 + - Fix initialization and creation of OpenSSL-internals for perlcc + compatibility (CPAN RT#95452) + - Add refresh option for peer_certificate, so that it checks if the + certificate changed in the mean time (on renegotiation) + - Fix fingerprint checking - now applies only to top-most certificate + - IO::Socket::SSL::Utils - accept extensions within CERT_create + - Various documentation fixes + +* Mon Jun 23 2014 Paul Howarth - 1.994-1 +- Update to 1.994 + - IO::Socket::SSL can now be used as dual-use socket, e.g. start plain, + upgrade to SSL and downgrade again all with the same object; see + documentation of SSL_startHandshake and chapter Advanced Usage + - Try to apply SSL_ca* even if verify_mode is 0, but don't complain if this + fails; this is needed if one wants to explicitly verify OCSP lookups even + if verification is otherwise off, because otherwise the signature check + would fail (this is mostly useful for testing) + - Reorder documentation of attributes for new, so that the more important + ones are at the top + +* Sun Jun 15 2014 Paul Howarth - 1.993-1 +- Update to 1.993 + - Major rewrite of documentation, now in separate file + - Rework error handling to distinguish between SSL errors and internal errors + (like missing capabilities) + - Fix handling of default_ca if given during the run of the program + (Debian #750646) + - util/analyze-ssl.pl - fix hostname check if SNI does not work + +* Tue Jun 10 2014 Paul Howarth - 1.992-1 +- Update to 1.992 + - Set $! to undef before doing IO (accept, read...); on Windows a connection + reset could cause an SSL read error without setting $!, so make sure we + don't keep the old value and maybe thus run into an endless loop + +* Sat Jun 07 2014 Fedora Release Engineering - 1.991-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild + +* Wed May 28 2014 Paul Howarth - 1.991-1 +- Update to 1.991 + - New option SSL_OCSP_TRY_STAPLE to enforce staple request even if + VERIFY_NONE + - Work around for CPAN RT#96013 in peer_certificates + +* Tue May 27 2014 Paul Howarth - 1.990-1 +- Update to 1.990 + - Added option SSL_ocsp_staple_callback to get the stapled OCSP response and + verify it somewhere else + - Try to fix warnings on Windows again (CPAN RT#95967) + - Work around temporary OCSP error in t/external/ocsp.t + +* Sun May 25 2014 Paul Howarth - 1.989-1 +- Update to 1.989 + - Fix warnings on Windows (CPAN RT#95881) + +* Sat May 17 2014 Paul Howarth - 1.988-1 +- Update to 1.988 + - Allow IPv4 in common name, because browsers allow this too; only for scheme + www/http though, not for rfc2818 (because RC2818 does not allow this; in + default scheme IPv6 and IPv4 are allowed in CN) + - Fix handling of public suffix; add exemption for *.googleapis.com + wildcard, which should not be allowed according to public suffix list but + actually is used + - Add hostname verification test based on older test of chromium, but change + some of the test expectations because we don't want to support IP as SAN + DNS and because we enforce a public suffix list (and thus *.co.uk should + not be allowed) + - Fix t/verify_hostname_standalone.t on systems without usable IDNA or IPv6 + (CPAN RT#95719) + - Enable IPv6 support only if we have a usable inet_pton + - Remove stale entries from MANIFEST + - Add transparent support for DER and PKCS#12 files to specify cert and key, + e.g. it will autodetect the format + - If SSL_cert_file is PEM and no SSL_key_file is given it will check if the + key is in SSL_cert_file too + +* Thu May 15 2014 Paul Howarth - 1.985-1 +- Update to 1.985 + - Make OCSP callback return 1 even if it was called on the server side + because of bad setup of the socket; otherwise we get an endless calling of + the OCSP callback + - Consider an OCSP response that is not yet or no longer valid a soft error + instead of a hard error + - Fix skip in t/external/ocsp.t in case fingerprint does not match + - Call EVP_PKEY_free not EVP_KEY_free in IO::Socket::SSL::Utils::KEY_free + (CPAN RT#95633) + - util/analyze.pl - with --show-chain check if chain with SNI is different + from chain w/o SNI +- Drop ExtUtils::MakeMaker version requirement + +* Wed May 14 2014 Paul Howarth - 1.984-2 +- Fix typo in Utils.pm (#1097640, CPAN RT#95633) + +* Sat May 10 2014 Paul Howarth - 1.984-1 +- Update to 1.984 + - Added OCSP support: + - Needs Net::SSLeay ≥ 1.59 + - For usage see documentation of IO::Socket::SSL (examples and anything + with OCSP in the name) + - New tool util/analyze-ssl.pl, which is intended to help in debugging of SSL + problems and to get information about capabilities of server; it works also + as an example of how to use various features (like OCSP, SNI...) + - Fix peer_certificates (returns leaf certificate only once on client side) + - Added timeout for stop_SSL (either with Timeout or with the default timeout + for IO::Socket) + - Fix IO::Socket::SSL::Utils mapping between ASN1_TIME and time_t when local + time is not GMT; use Net::SSLeay::ASN1_TIME_timet if available + - Fix t/external/usable_ca.t for system with junk in CA files + +* Sun May 4 2014 Paul Howarth - 1.983-1 +- Update to 1.983 + - Fix public suffix handling: ajax.googleapis.com should be ok even if + googleapis.com is in public suffix list (e.g. check one level less) + (CPAN RT#95317) + - usable_ca.t - update fingerprints after heartbleed attack + - usable_ca.t - make sure we have usable CA for tested hosts in CA store + +* Thu Apr 24 2014 Paul Howarth - 1.982-1 +- Update to 1.982 + - Fix for using subroutine as argument to set_args_filter_hack + +* Tue Apr 8 2014 Paul Howarth - 1.981-1 +- Update to 1.981 + - Fix ecdhe test for openssl 1.0.1d (CPAN RT#95432) + - Fix detection of openssl 1.0.1d (detected 1.0.1e instead) + - New function can_ecdh in IO::Socket::SSL + +* Tue Apr 8 2014 Paul Howarth - 1.980-1 +- Update to 1.980 + - Disable elliptic curve support for openssl 1.0.1d on 64-bit + (http://rt.openssl.org/Ticket/Display.html?id=2975) + - Fix certificate fingerprint calculation +- Add patch to skip elliptic curve test for openssl 1.0.1d on 64-bit +- Add patch to fix openssl version test + +* Sun Apr 6 2014 Paul Howarth - 1.979-1 +- Update to 1.979 + - Hostname checking: + - Configuration of 'leftmost' is renamed to 'full_label', but the old + version is kept for compatibility reasons + - Documentation of predefined schemes fixed to match reality + +* Fri Apr 4 2014 Paul Howarth - 1.978-1 +- Update to 1.978 + - Added public prefix checking to verification of wildcard certificates, e.g. + accept *.foo.com but not *.co.uk; see documentation of + SSL_verifycn_publicsuffix and IO::Socket::SSL::PublicSuffix + - Fix publicsuffix for IDNA, more tests with various IDNA libs + (CPAN RT#94424) + - Reuse result of IDN lib detection from PublicSuffix.pm in SSL.pm + - Add more checks to external/usable_ca.t; now it is enough that at least one + of the hosts verifies against the built-in CA store + - Add openssl and Net::SSLeay version to diagnostics in load test +- Switch preferred IDN back-end from Net::LibIDN to URI::_idna as per upstream, + falling back to Net::IDN::Encode on older distributions +- Add fix from upstream git to support building with Test::More < 0.88 + +* Wed Apr 2 2014 Paul Howarth - 1.975-1 +- Update to 1.975 + - BEHAVIOR CHANGE: work around TEA misfeature on OS X built-in openssl, e.g. + guarantee that only the explicitly-given CA or the openssl default CA will + be used; this means that certificates inside the OS X keyring will no + longer be used, because there is no way to control the use by openssl + (e.g. certificate pinning etc.) + - Make external tests run by default to make sure default CA works on all + platforms; it skips automatically on network problems like timeouts or SSL + interception, and can also use http(s)_proxy environment variables + +* Wed Apr 2 2014 Paul Howarth - 1.974-1 +- Update to 1.974 + - New function peer_certificates to get the whole certificate chain; needs + Net::SSLeay ≥ 1.58 + - Extended IO::Socket::Utils::CERT_asHash to provide way more information, + like issuer information, cert and pubkey digests, all extensions, CRL + distribution points and OCSP uri + +* Wed Mar 26 2014 Paul Howarth - 1.973-1 +- Update to 1.973 + - With SSL_ca, certificate handles can now be used in addition to + SSL_ca_file and SSL_ca_path + - No longer complain if SSL_ca_file and SSL_ca_path are both given; + instead, add both as options to the CA store + - Shortcut 'issuer' to give both issuer_cert and issuer_key in CERT_create + +* Sun Mar 23 2014 Paul Howarth - 1.972-1 +- Update to 1.972 + - Make sure t/external/usable_ca.t works also with older openssl without + support for SNI (CPAN RT#94117) + +* Sat Mar 22 2014 Paul Howarth - 1.971-1 +- Update to 1.971 + - Try to use SSL_hostname for hostname verification if no SSL_verifycn_name + is given; this way, hostname for SNI and verification can be specified in + one step + - New test program example/simulate_proxy.pl + +* Wed Mar 19 2014 Paul Howarth - 1.970-1 +- Update to 1.970 + - Make sure sub default_ca uses a local $_ and not a version of an outer + scope that might be read-only (CPAN RT#93987) + +* Sun Mar 16 2014 Paul Howarth - 1.969-1 +- Update to 1.969 + - Fix set_defaults to match documentation regarding short names + - New function set_args_filter_hack to make it possible to override bad SSL + settings from other code at the last moment + - Determine default_ca on module load (and not on first use in each thread) + - Don't try default hostname verification if verify_mode 0 + - Fix hostname verification when reusing context + +* Thu Mar 13 2014 Paul Howarth - 1.968-1 +- Update to 1.968 + - BEHAVIOR CHANGE: removed implicit defaults of certs/server-{cert,key}.pem + for SSL_{cert,key}_file and ca/,certs/my-ca.pem for SSL_ca_file; these + defaults were deprecated since 1.951 (July 2013) + - Usable CA verification path on Windows etc.: + - Do not use Net::SSLeay::CTX_set_default_verify_paths any longer to set + system/build dependent default verification path, because there was no + way to retrieve these default values and check if they contained usable + CA + - Instead, re-implement the same algorithm and export the results with + public function default_ca() and make it possible to overwrite it + - Also check for usable verification path during build; if no usable path + is detected, require Mozilla::CA at build and try to use it at runtime + +* Fri Feb 7 2014 Paul Howarth - 1.967-1 +- Update to 1.967 + - Verify the hostname inside a certificate by default with a superset of + common verification schemes instead of not verifying identity at all; for + now it will only complain if name verification failed but in the future it + will fail certificate verification, forcing you to set the expected + SSL_verifycn_name if you want to accept the certificate + - New option SSL_fingerprint and new methods get_fingerprint and + get_fingerprint_bin; together they can be used to selectively accept + specific certificates that would otherwise fail verification, like + self-signed, outdated or from unknown CAs + - Utils: + - Default RSA key length 2048 + - Digest algorithm to sign certificate in CERT_create can be given; + defaults to SHA-256 + - CERT_create can now issue non-CA self-signed certificate + - CERT_create add some more useful constraints to certificate + - Spelling fixes + +* Wed Jan 22 2014 Paul Howarth - 1.966-1 +- Update to 1.966 + - Fixed bug introduced in 1.964 - disabling TLSv1_2 no longer worked by + specifying !TLSv12; only !TLSv1_2 worked + - Fixed leak of session objects in SessionCache, if another session + replaced an existing session (introduced in 1.965) + +* Fri Jan 17 2014 Paul Howarth - 1.965-1 +- Update to 1.965 + - New key SSL_session_key to influence how sessions are inserted and looked + up in the client's session cache, which makes it possible to share sessions + over different ip:host (as is required with some FTPS servers) + - t/core.t - handle case where default loopback source is not 127.0.0.1, like + in FreeBSD jails + +* Wed Jan 15 2014 Paul Howarth - 1.964-1 +- Update to 1.964 + - Disabling TLSv1_1 did not work, because the constant was wrong; now it gets + the constants from calling Net::SSLeay::SSL_OP_NO_TLSv1_1 etc. + - The new syntax for the protocols is TLSv1_1 instead of TLSv11, which matches + the syntax from OpenSSL (the old syntax continues to work in SSL_version) + - New functions get_sslversion and get_sslversion_int, which get the SSL + version of the established session as string or int + - Disable t/io-socket-inet6.t if Acme::Override::INET is installed + +* Tue Jan 14 2014 Paul Howarth - 1.963-1 +- Update to 1.963 + - Fix behavior of stop_SSL: for blocking sockets it now enough to call it + once, for non-blocking it should be called again as long as EAGAIN and + SSL_ERROR is set to SSL_WANT_(READ|WRITE) + - Don't call blocking if start_SSL failed and downgraded socket has no + blocking method + - Documentation enhancements: + - Special section for differences to IO::Socket + - Describe problem with blocking accept on non-blocking socket + - Describe arguments to new_from_fd and make clear that for upgrading an + existing IO::Socket, start_SSL should be used directly + +* Thu Nov 28 2013 Paul Howarth - 1.962-1 +- Update to 1.962 + - Work around problems with older F5 BIG-IP by offering fewer ciphers on the + client side by default, so that the client hello stays below 255 bytes + +* Tue Nov 26 2013 Paul Howarth - 1.961-1 +- Update to 1.961 + - IO::Socket::SSL::Utils::CERT_create can now create CA-certificates that + are not self-signed (by giving issuer_*) + +* Wed Nov 13 2013 Paul Howarth - 1.960-1 +- Update to 1.960 + - Only documentation enhancements: + - Clarify with text and example code, that within event loops not only + select/poll should be used, but also pending has to be called + - Better introduction into SSL; at least mention anonymous authentication as + something you don't want and should take care with the right cipher + - Make it more clear that it's better not to change the cipher list unless + you really know what you're doing +- Adopt upstream's versioning scheme + +* Tue Nov 12 2013 Paul Howarth - 1.95.9-1 +- Update to 1.959 + - Fix test t/core.t for Windows + +* Mon Nov 11 2013 Paul Howarth - 1.95.8-1 +- Update to 1.958 + Lots of behavior changes for more secure defaults: + - BEHAVIOR CHANGE: make default cipher list more secure, especially: + - No longer support MD5 by default (broken) + - No longer support anonymous authentication by default (vulnerable to + man in the middle attacks) + - Prefer ECDHE/DHE ciphers and add necessary ECDH curve and DH keys, so + that it uses by default forward secrecy, if underlying + Net::SSLeay/openssl supports it + - Move RC4 to the end, i.e. 3DES is preferred (BEAST attack should + hopefully have been fixed and now RC4 is considered less safe than 3DES) + - Default SSL_honor_cipher_order to 1, e.g. when used as server it tries + to get the best cipher even if the client prefers other ciphers; PLEASE + NOTE that this might break connections with older, less secure + implementations, in which case revert to 'ALL:!LOW:!EXP:!aNULL' or so + - BEHAVIOR CHANGE: SSL_cipher_list now gets set on context, not SSL object, + and thus gets reused if context gets reused; PLEASE NOTE that using + SSL_cipher_list together with SSL_reuse_ctx no longer has any effect on + the ciphers of the context + - Rework hostname verification schemes: + - Add RFC names as scheme (e.g. 'rfc2818', ...) + - Add SIP, SNMP, syslog, netconf, GIST + - BEHAVIOR CHANGE: fix SMTP - now accept wildcards in CN and subjectAltName + - BEHAVIOR CHANGE: fix IMAP, POP3, ACAP, NNTP - now accept wildcards in CN + - BEHAVIOR CHANGE: anywhere wildcards like www* now match only 'www1', + 'www2' etc. but not 'www' + - Anywhere wildcards like x* are no longer applied to IDNA names (which start + with 'xn--') + - Fix crash of Utils::CERT_free + - Support TLSv11, TLSv12 as handshake protocols + - Fixed t/core.t: test used cipher_list of HIGH, which includes anonymous + authorization; with the DH param given by default since 1.956, old versions + of openssl (like 0.9.8k) used cipher ADH-AES256-SHA (e.g. anonymous + authorization) instead of AES256-SHA and thus the check for the peer + certificate failed (because ADH does not exchange certificates) - fixed by + explicitly specifying HIGH:!aNULL as cipher (CPAN RT#90221) + - Cleaned up tests: + - Remove ssl_settings.req and 02settings.t, because all tests now create a + simple socket at 127.0.0.1 and thus global settings are no longer needed + - Some tests did not have use strict(!); fixed it + - Removed special handling for older Net::SSLeay versions that are less + than our minimum requirement + - Some syntax enhancements: removed some SSL_version and SSL_cipher_list + options where they were not really needed + - Cleanup: remove workaround for old IO::Socket::INET6 but instead require at + least version 2.55 which is now 5 years old + - Fix t/session.t to work with older openssl versions (CPAN RT#90240) + +* Fri Oct 11 2013 Paul Howarth - 1.95.5-1 +- Update to 1.955 + - Support for perfect forward secrecy using ECDH, if the Net::SSLeay version + supports it + +* Sun Sep 15 2013 Paul Howarth - 1.95.4-1 +- Update to 1.954 + - Accept older versions of ExtUtils::MakeMaker and add meta information like + link to repository only for newer versions + +* Sat Aug 03 2013 Fedora Release Engineering - 1.95.3-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild + +* Mon Jul 22 2013 Petr Pisar - 1.95.3-2 +- Perl 5.18 rebuild + +* Mon Jul 22 2013 Paul Howarth - 1.95.3-1 +- Update to 1.953 + - Precedence fixes for IO::Socket::SSL::Utils (CPAN RT#87052) + +* Fri Jul 12 2013 Paul Howarth - 1.95.2-1 +- Update to 1.952 + - Fix t/acceptSSL-timeout.t on Win32 (CPAN RT#86862) + +* Wed Jul 3 2013 Paul Howarth - 1.95.1-1 +- Update to 1.951 + (1.950) + - MAJOR BEHAVIOR CHANGE: + - ssl_verify_mode now defaults to verify_peer for client + - Previously it used verify_none, but loudly complained since 1.79 about it + - It will not complain any longer, but the connection will probably fail + - Please don't simply disable ssl verification; instead, set SSL_ca_file + etc. so that verification succeeds! + - MAJOR BEHAVIOR CHANGE: + - It will now complain if the built-in defaults of certs/my-ca.pem or ca/ + for CA and certs/{server,client}-{key,cert}.pem for cert and key are + used, i.e. no certificates are specified explicitly + - In the future these insecure (relative path!) defaults will be removed + and the CA replaced with the system defaults + (1.951) + - Use Net::SSLeay::SSL_CTX_set_default_verify_paths to use openssl's built-in + defaults for CA unless CA path/file was given (or IO::Socket::SSL built-ins + used) + +* Sat Jun 1 2013 Paul Howarth - 1.94-1 +- Update to 1.94 + - Makefile.PL reported wrong version of openssl if Net::SSLeay was not + installed, instead of reporting a missing dependency of Net::SSLeay + +* Fri May 31 2013 Paul Howarth - 1.93-1 +- Update to 1.93 + - Need at least OpenSSL version 0.9.8 now, since last 0.9.7 was released 6 + years ago; remove code to work around older releases + - Changed AUTHOR in Makefile.PL from array back to string, because the array + feature is not available in MakeMaker shipped with 5.8.9 (CPAN RT#85739) +- Set openssl version requirement to 0.9.8 +- Drop ExtUtils::MakeMaker version requirement back to 6.46 + +* Thu May 30 2013 Paul Howarth - 1.92-1 +- Update to 1.92 + - Intercept: use sha1-fingerprint of original cert for id into cache unless + otherwise given + - Fix pod error in IO::Socket::SSL::Utils (CPAN RT#85733) + +* Thu May 30 2013 Paul Howarth - 1.91-1 +- Update to 1.91 + - Added IO::Socket::SSL::Utils for easier manipulation of certificates and + keys + - Moved SSL interception into IO::Socket::SSL::Intercept and simplified it + using IO::Socket::SSL::Utils + - Enhance meta information in Makefile.PL +- Bump openssl version requirement to 0.9.8a +- Need at least version 6.58 of ExtUtils::MakeMaker (CPAN RT#85739) + +* Wed May 29 2013 Paul Howarth - 1.90-1 +- Update to 1.90 + - Support more digests, especially SHA-2 (CPAN RT#85290) + - Added support for easy SSL interception (man in the middle) based on ideas + found in mojo-mitm proxy + - Make 1.46 the minimal required version for Net::SSLeay, because it + introduced lots of useful functions +- BR:/R: openssl ≥ 0.9.7e for P_ASN1_TIME_(get,set)_isotime in Net::SSLeay + +* Tue May 14 2013 Paul Howarth - 1.89-1 +- Update to 1.89 + - If IO::Socket::IP is used it should be at least version 0.20; otherwise we + get problems with HTTP::Daemon::SSL and maybe others (CPAN RT#81932) + - Spelling corrections + +* Thu May 2 2013 Paul Howarth - 1.88-1 +- Update to 1.88 + - Consider a value of '' the same as undef for SSL_ca_(path|file), SSL_key* + and SSL_cert* - some apps like Net::LDAP use it that way + +* Wed Apr 24 2013 Paul Howarth - 1.87-1 +- Update to 1.87 + - Complain if given SSL_(key|cert|ca)_(file|path) do not exist or if they are + not readable (CPAN RT#84829) + - Fix use of SSL_key|SSL_file objects instead of files, broken with 1.83 + +* Wed Apr 17 2013 Paul Howarth - 1.86-1 +- Update to 1.86 + - Don't warn about SSL_verify_mode when re-using an existing SSL context + (CPAN RT#84686) + +* Mon Apr 15 2013 Paul Howarth - 1.85-1 +- Update to 1.85 + - Probe for available modules with local __DIE__ and __WARN__handlers + (CPAN RT#84574) + - Fix warning, when IO::Socket::IP is installed and inet6 support gets + explicitly requested (CPAN RT#84619) + +* Sat Feb 16 2013 Paul Howarth - 1.84-1 +- Update to 1.84 + - Disabled client side SNI for openssl version < 1.0.0 because of + CPAN RT#83289 + - Added functions can_client_sni, can_server_sni and can_npn to check + availability of SNI and NPN features + - Added more documentation for SNI and NPN + +* Thu Feb 14 2013 Paul Howarth - 1.83-2 +- Update to 1.831 + - Separated documentation of non-blocking I/O from error handling + - Changed and documented behavior of readline to return the read data on + EAGAIN/EWOULDBLOCK in case of non-blocking socket + (see https://github.com/noxxi/p5-io-socket-ssl/issues/1) +- Bumped release rather than version number to preserve likely upgrade path + and avoid need for epoch or version number ugliness; may revisit this in + light of upstream's future version numbering decisions + +* Mon Feb 4 2013 Paul Howarth - 1.83-1 +- Update to 1.83 + - Server Name Indication (SNI) support on the server side (CPAN RT#82761) + - Reworked part of the documentation, like providing better examples + +* Mon Jan 28 2013 Paul Howarth - 1.82-1 +- Update to 1.82 + - sub error sets $SSL_ERROR etc. only if there really is an error; otherwise + it will keep the latest error, which allows IO::Socket::SSL->new to report + the correct problem, even if the problem is deeper in the code (like in + connect) + - Correct spelling (CPAN RT#82790) + +* Thu Dec 6 2012 Paul Howarth - 1.81-1 +- Update to 1.81 + - Deprecated set_ctx_defaults; new name is set_defaults (the old name is + still available) + - Changed handling of default path for SSL_(ca|cert|key)* keys: if one of + these keys is user defined, don't add defaults for the others, i.e. + don't mix user settings and defaults + - Cleaner handling of module defaults vs. global settings vs. socket + specific settings; global and socket specific settings are both provided + by the user, while module defaults are not + - Make IO::Socket::INET6 and IO::Socket::IP specific tests both run, even + if both modules are installed, by faking a failed load of the other module +- BR: perl(IO::Socket::INET6) and perl(Socket6) unconditionally + +* Fri Nov 30 2012 Paul Howarth - 1.80-1 +- Update to 1.80 + - Removed some warnings in test (missing SSL_verify_mode => 0), which caused + tests to hang on Windows (CPAN RT#81493) + +* Sun Nov 25 2012 Paul Howarth - 1.79-1 +- Update to 1.79 + - Use getnameinfo instead of unpack_sockaddr_in6 to get PeerAddr and PeerPort + from sockaddr in _update_peer, because this provides scope too + - Work around systems that don't define AF_INET6 (CPAN RT#81216) + - Prepare transition to a more secure default for SSL_verify_mode; the use of + the current default SSL_VERIFY_NONE will cause a big warning for clients, + unless SSL_verify_mode was explicitly set inside the application to this + insecure value (in the near future the default will be SSL_VERIFY_PEER, and + thus causing verification failures in unchanged applications) + +* Thu Nov 15 2012 Petr Šabata - 1.77-2 +- Added some missing build dependencies + +* Fri Oct 5 2012 Paul Howarth - 1.77-1 +- Update to 1.77 + - support _update_peer for IPv6 too (CPAN RT#79916) + +* Fri Jul 20 2012 Fedora Release Engineering - 1.76-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + +* Thu Jun 28 2012 Petr Pisar - 1.76-2 +- Perl 5.16 rebuild + +* Mon Jun 18 2012 Paul Howarth - 1.76-1 +- Update to 1.76 + - add support for IO::Socket::IP, which supports inet6 and inet4 + (CPAN RT#75218) + - fix documentation errors (CPAN RT#77690) + - made it possible to explicitly disable TLSv11 and TLSv12 in SSL_version + - use inet_pton from either Socket.pm 1.95 or Socket6.pm +- Use IO::Socket::IP for IPv6 support where available, else IO::Socket::INET6 +- Add runtime dependency for appropriate IPv6 support module so that we can + ensure that we run at runtime what we tested with at build time + +* Thu Jun 14 2012 Petr Pisar - 1.74-2 +- Perl 5.16 rebuild + +* Mon May 14 2012 Paul Howarth - 1.74-1 +- Update to 1.74 + - accept a version of SSLv2/3 as SSLv23, because older documentation could + be interpreted like this + +* Fri May 11 2012 Paul Howarth - 1.73-1 +- Update to 1.73 + - set DEFAULT_CIPHER_LIST to ALL:!LOW instead of HIGH:!LOW + - make test t/dhe.t hopefully work with more versions of openssl + +* Wed May 9 2012 Paul Howarth - 1.71-1 +- Update to 1.71 + - 1.70 done right: don't disable SSLv2 ciphers; SSLv2 support is better + disabled by the default SSL_version of 'SSLv23:!SSLv2' + +* Tue May 8 2012 Paul Howarth - 1.70-1 +- Update to 1.70 + - make it possible to disable protocols using SSL_version, and make + SSL_version default to 'SSLv23:!SSLv2' + +* Tue May 8 2012 Paul Howarth - 1.69-1 +- Update to 1.69 (changes for CPAN RT#76929) + - if no explicit cipher list is given, default to ALL:!LOW instead of the + openssl default, which usually includes weak ciphers like DES + - new config key SSL_honor_cipher_order and document how to use it to fight + BEAST attack + - fix behavior for empty cipher list (use default) + - re-added workaround in t/dhe.t + +* Mon Apr 16 2012 Paul Howarth - 1.66-1 +- Update to 1.66 + - make it thread safer (CPAN RT#76538) + +* Mon Apr 16 2012 Paul Howarth - 1.65-1 +- Update to 1.65 + - added NPN (Next Protocol Negotiation) support (CPAN RT#76223) + +* Sat Apr 7 2012 Paul Howarth - 1.64-1 +- Update to 1.64 + - ignore die from within eval to make tests more stable on Win32 + (CPAN RT#76147) + - clarify some behavior regarding hostname verification +- Drop patch for t/dhe.t, no longer needed + +* Wed Mar 28 2012 Paul Howarth - 1.62-1 +- Update to 1.62 + - small fix to last version + +* Tue Mar 27 2012 Paul Howarth - 1.61-1 +- Update to 1.61 + - call CTX_set_session_id_context so that server's session caching works with + client certificates too (CPAN RT#76053) + +* Tue Mar 20 2012 Paul Howarth - 1.60-1 +- Update to 1.60 + - don't make blocking readline if socket was set nonblocking, but return as + soon no more data are available (CPAN RT#75910) + - fix BUG section about threading so that it shows package as thread safe + as long as Net::SSLeay ≥ 1.43 is used (CPAN RT#75749) +- BR: perl(constant), perl(Exporter) and perl(IO::Socket) + +* Thu Mar 8 2012 Paul Howarth - 1.59-1 +- Update to 1.59 + - if SSLv2 is not supported by Net::SSLeay set SSL_ERROR with useful message + when attempting to use it + - modify constant declarations so that 5.6.1 should work again +- Drop %%defattr, redundant since rpm 4.4 + +* Mon Feb 27 2012 Paul Howarth - 1.58-1 +- Update to 1.58 + - fix t/dhe.t for openssl 1.0.1 beta by forcing TLSv1, so that it does not + complain about the too small RSA key, which it should not use anyway; this + workaround is not applied for older openssl versions, where it would cause + failures (CPAN RT#75165) +- Add patch to fiddle the openssl version number in the t/dhe.t workaround + because the OPENSSL_VERSION_NUMBER cannot be trusted in Fedora +- One buildreq per line for readability +- Drop redundant buildreq perl(Test::Simple) +- Always run full test suite + +* Wed Feb 22 2012 Paul Howarth - 1.56-1 +- Update to 1.56 + - add automatic or explicit (via SSL_hostname) SNI support, needed for + multiple SSL hostnames with the same IP (currently only supported for the + client) +- Use DESTDIR rather than PERL_INSTALL_ROOT +- No need to delete empty directories from buildroot + +* Mon Feb 20 2012 Paul Howarth - 1.55-1 +- Update to 1.55 + - work around IO::Socket's work around for systems returning EISCONN etc. on + connect retry for non-blocking sockets by clearing $! if SUPER::connect + returned true (CPAN RT#75101) + +* Wed Jan 11 2012 Paul Howarth - 1.54-1 +- Update to 1.54 + - return 0 instead of undef in SSL_verify_callback to fix uninitialized + warnings (CPAN RT#73629) + +* Mon Dec 12 2011 Paul Howarth - 1.53-1 +- Update to 1.53 + - kill child in t/memleak_bad_handshake.t if test fails (CPAN RT#73146) + +* Wed Dec 7 2011 Paul Howarth - 1.52-1 +- Update to 1.52 + - fix for t/nonblock.t hangs on AIX (CPAN RT#72305) + - disable t/memleak_bad_handshake.t on AIX, because it might hang + (CPAN RT#72170) + - fix syntax error in t/memleak_bad_handshake.t + +* Fri Oct 28 2011 Paul Howarth - 1.49-1 +- Update to 1.49 + - another regression for readline fix: this time it failed to return lines + at EOF that don't end with newline - extended t/readline.t to catch this + case and the fix for 1.48 + +* Wed Oct 26 2011 Paul Howarth - 1.48-1 +- Update to 1.48 + - further fix for readline fix in 1.45: if the pending data were false (like + '0'), it failed to read the rest of the line (CPAN RT#71953) + +* Fri Oct 21 2011 Paul Howarth - 1.47-1 +- Update to 1.47 + - fix for 1.46 - check for mswin32 needs to be /i + +* Tue Oct 18 2011 Paul Howarth - 1.46-1 +- Update to 1.46 + - skip signals test on Windows + +* Thu Oct 13 2011 Paul Howarth - 1.45-1 +- Update to 1.45 + - fix readline to continue when getting interrupt waiting for more data +- BR: perl(Carp) + +* Tue Jul 19 2011 Petr Sabata - 1.44-2 +- Perl mass rebuild + +* Fri May 27 2011 Paul Howarth - 1.44-1 +- Update to 1.44 + - fix invalid call to inet_pton in verify_hostname_of_cert when identity + should be verified as ipv6 address because it contains a colon + +* Wed May 11 2011 Paul Howarth - 1.43-1 +- Update to 1.43 + - add SSL_create_ctx_callback to have a way to adjust context on creation + (CPAN RT#67799) + - describe problem of fake memory leak because of big session cache and how + to fix it (CPAN RT#68073) + - fix t/nonblock.t + - stability improvements for t/inet6.t + +* Tue May 10 2011 Paul Howarth - 1.41-1 +- Update to 1.41 + - fix issue in stop_SSL where it did not issue a shutdown of the SSL + connection if it first received the shutdown from the other side + - try to make t/nonblock.t more reliable, at least report the real cause of + SSL connection errors +- No longer need to re-code docs to UTF-8 + +* Mon May 2 2011 Paul Howarth - 1.40-1 +- Update to 1.40 + - fix in example/async_https_server + - get IDN support from URI (CPAN RT#67676) +- Nobody else likes macros for commands + +* Thu Mar 3 2011 Paul Howarth - 1.39-1 +- Update to 1.39 + - fixed documentation of http verification: wildcards in cn is allowed + +* Tue Feb 08 2011 Fedora Release Engineering - 1.38-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Tue Jan 18 2011 Paul Howarth - 1.38-1 +- Update to 1.38 + - fixed wildcards_in_cn setting for http, wrongly set in 1.34 to 1 instead of + anywhere (CPAN RT#64864) + +* Fri Dec 10 2010 Paul Howarth - 1.37-1 +- Update to 1.37 + - don't complain about invalid certificate locations if user explicitly set + SSL_ca_path and SSL_ca_file to undef: assume that user knows what they are + doing and will work around the problems themselves (CPAN RT#63741) + +* Thu Dec 9 2010 Paul Howarth - 1.36-1 +- Update to 1.36 + - update documentation for SSL_verify_callback based on CPAN RT#63743 and + CPAN RT#63740 + +* Mon Dec 6 2010 Paul Howarth - 1.35-1 +- Update to 1.35 (addresses CVE-2010-4334) + - if verify_mode is not VERIFY_NONE and the ca_file/ca_path cannot be + verified as valid, it will no longer fall back to VERIFY_NONE but throw an + error (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058) + +* Tue Nov 2 2010 Paul Howarth - 1.34-1 +- Update to 1.34 + - schema http for certificate verification changed to wildcards_in_cn=1 + - if upgrading socket from inet to ssl fails due to handshake problems, the + socket gets downgraded back again but is still open (CPAN RT#61466) + - deprecate kill_socket: just use close() + +* Sun May 02 2010 Marcela Maslanova - 1.33-2 +- Mass rebuild with perl-5.12.0 + +* Wed Mar 17 2010 Paul Howarth - 1.33-1 +- Update to 1.33 + - attempt to make t/memleak_bad_handshake.t more stable + - fix hostname checking: only check an IP against subjectAltName GEN_IPADD + +* Tue Feb 23 2010 Paul Howarth - 1.32-1 +- Update to 1.32 (die in Makefile.PL if Scalar::Util has no dualvar support) +- Use %%{_fixperms} macro instead of our own %%{__chmod} incantation + +* Mon Dec 7 2009 Stepan Kasal - 1.31-2 +- Rebuild against perl 5.10.1 + +* Sun Sep 27 2009 Paul Howarth - 1.31-1 +- Update to 1.31 (see Changes for details) + +* Thu Aug 20 2009 Paul Howarth - 1.30-1 +- Update to 1.30 (fix memleak when SSL handshake failed) +- Add buildreq procps needed for memleak test + +* Mon Jul 27 2009 Paul Howarth - 1.27-1 +- Update to 1.27 + - various regex fixes for i18n and service names + - fix warnings from perl -w (CPAN RT#48131) + - improve handling of errors from Net::ssl_write_all + +* Sat Jul 25 2009 Fedora Release Engineering - 1.26-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild + +* Sat Jul 4 2009 Paul Howarth - 1.26-1 +- Update to 1.26 (verify_hostname_of_cert matched only the prefix for the + hostname when no wildcard was given, e.g. www.example.org matched against a + certificate with name www.exam in it [#509819]) + +* Fri Jul 3 2009 Paul Howarth - 1.25-1 +- Update to 1.25 (fix t/nonblock.t for OS X 10.5 - CPAN RT#47240) + +* Thu Apr 2 2009 Paul Howarth - 1.24-1 +- Update to 1.24 (add verify hostname scheme ftp, same as http) + +* Wed Feb 25 2009 Paul Howarth - 1.23-1 +- Update to 1.23 (complain when no certificates are provided) + +* Sat Jan 24 2009 Paul Howarth - 1.22-1 +- Update to latest upstream version: 1.22 + +* Thu Jan 22 2009 Paul Howarth - 1.20-1 +- Update to latest upstream version: 1.20 + +* Tue Nov 18 2008 Paul Howarth - 1.18-1 +- Update to latest upstream version: 1.18 +- BR: perl(IO::Socket::INET6) for extra test coverage + +* Mon Oct 13 2008 Paul Howarth - 1.17-1 +- Update to latest upstream version: 1.17 + +* Mon Sep 22 2008 Paul Howarth - 1.16-1 +- Update to latest upstream version: 1.16 + +* Sat Aug 30 2008 Paul Howarth - 1.15-1 +- Update to latest upstream version: 1.15 +- Add buildreq and req for perl(Net::LibIDN) to avoid croaking when trying to + verify an international name against a certificate + +* Wed Jul 16 2008 Paul Howarth - 1.14-1 +- Update to latest upstream version: 1.14 +- BuildRequire perl(Net::SSLeay) >= 1.21 + +* Wed Feb 27 2008 Tom "spot" Callaway - 1.12-4 +- Rebuild for perl 5.10 (again) + +* Thu Jan 31 2008 Tom "spot" Callaway - 1.12-3 +- Rebuild for new perl + +* Wed Nov 28 2007 Paul Howarth - 1.12-2 +- Cosmetic spec changes suiting new maintainer's preferences + +* Fri Oct 26 2007 Robin Norwood - 1.12-1 +- Update to latest upstream version: 1.12 +- Fix license tag +- Add BuildRequires for ExtUtils::MakeMaker and Test::Simple +- Fix package review issues: +- Source URL +- Resolves: bz#226264 + +* Tue Oct 16 2007 Tom "spot" Callaway - 1.02-1.1 +- Correct license tag +- Add BR: perl(ExtUtils::MakeMaker) + +* Sat Dec 02 2006 Robin Norwood - 1.02-1 +- Upgrade to latest CPAN version: 1.02 + +* Mon Sep 18 2006 Warren Togami - 1.01-1 +- 1.01 bug fixes (#206782) + +* Sun Aug 13 2006 Warren Togami - 0.998-1 +- 0.998 with more important fixes + +* Tue Aug 01 2006 Warren Togami - 0.994-1 +- 0.994 important bugfixes (#200860) + +* Tue Jul 18 2006 Warren Togami - 0.991-1 +- 0.991 + +* Wed Jul 12 2006 Warren Togami - 0.97-3 +- Import into FC6 + +* Tue Feb 28 2006 Jose Pedro Oliveira - 0.97-2 +- Rebuild for FC5 (perl 5.8.8). +- Rebuild switch: "--with sessiontests". + +* Mon Jul 18 2005 Ville Skyttä - 0.97-1 +- 0.97. +- Convert docs to UTF-8, drop some unuseful ones. + +* Wed Apr 6 2005 Michael Schwendt - 0.96-4 +- Rebuilt + +* Tue Oct 12 2004 Ville Skyttä - 0:0.96-3 +- Disable session test suite even if Net::SSLeay >= 1.26 is available. + +* Wed Jul 7 2004 Ville Skyttä - 0:0.96-0.fdr.2 +- Bring up to date with current fedora.us Perl spec template. +- Include examples in docs. + +* Sat May 1 2004 Ville Skyttä - 0:0.96-0.fdr.1 +- Update to 0.96. +- Reduce directory ownership bloat. +- Require perl(:MODULE_COMPAT_*). + +* Fri Oct 17 2003 Ville Skyttä - 0:0.95-0.fdr.1 +- First build.