From c1f1b41420ea82489e6512d909f1af1325965ed4 Mon Sep 17 00:00:00 2001 From: Paul Howarth <p...@city-fan.org> Date: Sat, 30 Jan 2016 19:08:57 +0000 Subject: Update to 2.023
- New upstream release 2.023 - OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS connection was not fully established, which somehow resulted in Net::SSLeay::shutdown returning 0 (i.e. keep trying) and hence an endless loop; it will now ignore this result in case the TLS connection was not yet established and consider the TLS connection closed instead - Update patches as needed --- ...-SSL-2.021-use-system-default-SSL-version.patch | 36 ---------------------- ...-SSL-2.023-use-system-default-SSL-version.patch | 36 ++++++++++++++++++++++ perl-IO-Socket-SSL.spec | 13 ++++++-- sources | 2 +- 4 files changed, 48 insertions(+), 39 deletions(-) delete mode 100644 IO-Socket-SSL-2.021-use-system-default-SSL-version.patch create mode 100644 IO-Socket-SSL-2.023-use-system-default-SSL-version.patch diff --git a/IO-Socket-SSL-2.021-use-system-default-SSL-version.patch b/IO-Socket-SSL-2.021-use-system-default-SSL-version.patch deleted file mode 100644 index 5f89425..0000000 --- a/IO-Socket-SSL-2.021-use-system-default-SSL-version.patch +++ /dev/null @@ -1,36 +0,0 @@ ---- lib/IO/Socket/SSL.pm -+++ lib/IO/Socket/SSL.pm -@@ -85,7 +85,7 @@ my $algo2digest = do { - # global defaults - my %DEFAULT_SSL_ARGS = ( - SSL_check_crl => 0, -- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 as broken -+ SSL_version => '', - SSL_verify_callback => undef, - SSL_verifycn_scheme => undef, # fallback cn verification - SSL_verifycn_publicsuffix => undef, # fallback default list verification -@@ -2167,7 +2167,7 @@ sub new { - $ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE; - $ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh; - -- my $ver; -+ my $ver = ''; - for (split(/\s*:\s*/,$arg_hash->{SSL_version})) { - m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i - or croak("invalid SSL_version specified"); ---- lib/IO/Socket/SSL.pod -+++ lib/IO/Socket/SSL.pod -@@ -942,11 +942,12 @@ protocol to the specified version. - All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can - also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires - recent versions of Net::SSLeay and openssl. -+The default SSL_version is defined by the underlying cryptographic library. - - Independent from the handshake format you can limit to set of accepted SSL - versions by adding !version separated by ':'. - --The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the -+For example, 'SSLv23:!SSLv3:!SSLv2' means that the - handshake format is compatible to SSL2.0 and higher, but that the successful - handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because - both of these versions have serious security issues and should not be used diff --git a/IO-Socket-SSL-2.023-use-system-default-SSL-version.patch b/IO-Socket-SSL-2.023-use-system-default-SSL-version.patch new file mode 100644 index 0000000..0354427 --- /dev/null +++ b/IO-Socket-SSL-2.023-use-system-default-SSL-version.patch @@ -0,0 +1,36 @@ +--- lib/IO/Socket/SSL.pm ++++ lib/IO/Socket/SSL.pm +@@ -85,7 +85,7 @@ my $algo2digest = do { + # global defaults + my %DEFAULT_SSL_ARGS = ( + SSL_check_crl => 0, +- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 as broken ++ SSL_version => '', + SSL_verify_callback => undef, + SSL_verifycn_scheme => undef, # fallback cn verification + SSL_verifycn_publicsuffix => undef, # fallback default list verification +@@ -2172,7 +2172,7 @@ sub new { + $ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE; + $ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh; + +- my $ver; ++ my $ver = ''; + for (split(/\s*:\s*/,$arg_hash->{SSL_version})) { + m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i + or croak("invalid SSL_version specified"); +--- lib/IO/Socket/SSL.pod ++++ lib/IO/Socket/SSL.pod +@@ -942,11 +942,12 @@ protocol to the specified version. + All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can + also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires + recent versions of Net::SSLeay and openssl. ++The default SSL_version is defined by the underlying cryptographic library. + + Independent from the handshake format you can limit to set of accepted SSL + versions by adding !version separated by ':'. + +-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the ++For example, 'SSLv23:!SSLv3:!SSLv2' means that the + handshake format is compatible to SSL2.0 and higher, but that the successful + handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because + both of these versions have serious security issues and should not be used diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec index 5c123ac..370bc71 100644 --- a/perl-IO-Socket-SSL.spec +++ b/perl-IO-Socket-SSL.spec @@ -1,5 +1,5 @@ Name: perl-IO-Socket-SSL -Version: 2.022 +Version: 2.023 Release: 1%{?dist} Summary: Perl library for transparent SSL Group: Development/Libraries @@ -7,7 +7,7 @@ License: GPL+ or Artistic URL: http://search.cpan.org/dist/IO-Socket-SSL/ Source0: http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz Patch0: IO-Socket-SSL-2.021-use-system-default-cipher-list.patch -Patch1: IO-Socket-SSL-2.021-use-system-default-SSL-version.patch +Patch1: IO-Socket-SSL-2.023-use-system-default-SSL-version.patch BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu) BuildArch: noarch # Module Build @@ -115,6 +115,15 @@ rm -rf %{buildroot} %{_mandir}/man3/IO::Socket::SSL::Utils.3* %changelog +* Sat Jan 30 2016 Paul Howarth <p...@city-fan.org> - 2.023-1 +- Update to 2.023 + - OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS + connection was not fully established, which somehow resulted in + Net::SSLeay::shutdown returning 0 (i.e. keep trying) and hence an endless + loop; it will now ignore this result in case the TLS connection was not + yet established and consider the TLS connection closed instead +- Update patches as needed + * Thu Dec 10 2015 Paul Howarth <p...@city-fan.org> - 2.022-1 - Update to 2.022 - Fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash diff --git a/sources b/sources index 9877046..bd22d08 100644 --- a/sources +++ b/sources @@ -1 +1 @@ -a5f284d543aec4a6fcd595eb5fc8898b IO-Socket-SSL-2.022.tar.gz +89df81cbc1c477937fdcfa8fea173a48 IO-Socket-SSL-2.023.tar.gz -- cgit v0.11.2 http://pkgs.fedoraproject.org/cgit/perl-IO-Socket-SSL.git/commit/?h=master&id=c1f1b41420ea82489e6512d909f1af1325965ed4 -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/perl-devel@lists.fedoraproject.org