Package: ssl-cert-check
Version: 3.29-1
Followup-For: Bug #769952
The 3.29-1 version does not handle SNI support with OpenSSL 1.1.0.
See the attached patch for a backwards compatible fix.
-- System Information:
Debian Release: stretch/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 4.8.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
>From 69547df2e14718dd4ba3092af423ffcf7ad47508 Mon Sep 17 00:00:00 2001
From: Eivind Uggedal <eiv...@uggedal.com>
Date: Tue, 20 Dec 2016 14:03:31 +0100
Subject: [PATCH] support SNI for OpenSSL >= 1.1.0
OpenSSL 1.1.0 introduced option parsing cleanups. Previous
versions would list a full usage summary (including the
-servername flag for s_client). Never versions do not:
openssl s_client -h
s_client: Option unknown option -h
s_client: Use -help for summary.
---
ssl-cert-check | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ssl-cert-check b/ssl-cert-check
index 079bcb81f240..ef927fd0b757 100644
--- a/ssl-cert-check
+++ b/ssl-cert-check
@@ -704,7 +704,7 @@ then
fi
# Send along the servername when TLS is used
-if ${OPENSSL} s_client -h 2>&1 | grep '-servername' > /dev/null
+if ${OPENSSL} s_client --help 2>&1 | grep '-servername' > /dev/null
then
TLSSERVERNAME="TRUE"
else
--
2.11.0