Update to 2.001

- New upstream release 2.001
  - Add SSL_OP_SINGLE_(DH|ECDH)_USE to default options to increase PFS security
  - Update external tests with currently expected fingerprints of hosts
  - Some fixes to make it still work on 5.8.1
This commit is contained in:
Paul Howarth 2014-10-21 15:27:58 +01:00
parent 0249c6324b
commit 3c5f052538
3 changed files with 16 additions and 9 deletions

View File

@ -9,9 +9,9 @@
SSL_verify_callback => undef,
SSL_verifycn_scheme => undef, # fallback cn verification
SSL_verifycn_publicsuffix => undef, # fallback default list verification
@@ -2054,7 +2054,7 @@ WARN
my $ssl_op = Net::SSLeay::OP_ALL();
@@ -2056,7 +2056,7 @@ WARN
$ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE;
$ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh;
- my $ver;
+ my $ver = '';
@ -20,15 +20,16 @@
or croak("invalid SSL_version specified");
--- lib/IO/Socket/SSL.pod
+++ lib/IO/Socket/SSL.pod
@@ -910,11 +910,11 @@ protocol to the specified version.
@@ -910,11 +910,12 @@ protocol to the specified version.
All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can
also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires
recent versions of Net::SSLeay and openssl.
+The default SSL_version is defined by the underlying cryptographic library.
Indipendend from the handshake format you can limit to set of accepted SSL
-Independend from the handshake format you can limit to set of accepted SSL
+Independent from the handshake format you can limit the set of accepted SSL
versions by adding !version separated by ':'.
-
-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
handshake format is compatible to SSL2.0 and higher, but that the successful

View File

@ -1,5 +1,5 @@
Name: perl-IO-Socket-SSL
Version: 2.000
Version: 2.001
Release: 1%{?dist}
Summary: Perl library for transparent SSL
Group: Development/Libraries
@ -7,7 +7,7 @@ License: GPL+ or Artistic
URL: http://search.cpan.org/dist/IO-Socket-SSL/
Source0: http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
Patch0: IO-Socket-SSL-2.000-use-system-default-cipher-list.patch
Patch1: IO-Socket-SSL-2.000-use-system-default-SSL-version.patch
Patch1: IO-Socket-SSL-2.001-use-system-default-SSL-version.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
BuildArch: noarch
BuildRequires: openssl >= 0.9.8
@ -100,6 +100,12 @@ rm -rf %{buildroot}
%{_mandir}/man3/IO::Socket::SSL::Utils.3*
%changelog
* Tue Oct 21 2014 Paul Howarth <paul@city-fan.org> - 2.001-1
- Update to 2.001
- Add SSL_OP_SINGLE_(DH|ECDH)_USE to default options to increase PFS security
- Update external tests with currently expected fingerprints of hosts
- Some fixes to make it still work on 5.8.1
* Thu Oct 16 2014 Paul Howarth <paul@city-fan.org> - 2.000-1
- Update to 2.000
- Consider SSL3.0 as broken because of POODLE and disable it by default

View File

@ -1 +1 @@
cc45d249551032e09daa421ca59d5565 IO-Socket-SSL-2.000.tar.gz
9562d344f0b3962b95303fad54277999 IO-Socket-SSL-2.001.tar.gz