Hello community,
here is the log from the commit of package perl-IO-Socket-SSL for
openSUSE:Factory checked in at 2015-04-22 01:12:30
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL (Old)
and /work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "perl-IO-Socket-SSL"
Changes:
--------
--- /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL/perl-IO-Socket-SSL.changes
2014-07-28 06:31:03.000000000 +0200
+++
/work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new/perl-IO-Socket-SSL.changes
2015-04-22 01:12:31.000000000 +0200
@@ -1,0 +2,100 @@
+Fri Apr 17 12:32:39 UTC 2015 - [email protected]
+
+- add DHE-RSA to the default client cipher list to support PFS with
+ older machines (bnc#924976)
+ * added perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
+- add cpanspec.yml to support automatic version updates
+ (see http://lists.opensuse.org/opensuse-packaging/2015-04/msg00084.html)
+
+-------------------------------------------------------------------
+Tue Apr 14 18:29:56 UTC 2015 - [email protected]
+
+- updated to 2.012
+ see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
+
+ 2.012 2014/02/02
+ - fix t/ocsp.t in case no HTTP::Tiny is installed
+ 2.011 2014/02/01
+ - fix t/ocsp.t - don't count on revoked.grc.com using OCSP stapling #101855
+ - added option 'purpose' to Utils::CERT_create to get better control of the
+ certificates purpose. Default is 'server,client' for non-CA (contrary to
+ only 'server' before)
+ - removed RC4 from default cipher suites on the server site
+ https://github.com/noxxi/p5-io-socket-ssl/issues/22
+ - refactoring of some tests using Test::More thanks to Sweet-kid and the
+ 2015 Pull Request Challenge
+ 2.010 2014/01/14
+ - new options SSL_client_ca_file and SSL_client_ca to let the server send
+ the list of acceptable CAs for the client certificate.
+ - t/protocol_version.t - fix in case SSLv3 is not supported in Net::SSLeay.
+ RT#101485, thanks to TEAM.
+ 2.009 2014/01/12
+ - remove util/analyze.pl. This tool is now together with other SSL tools in
+ https://github.com/noxxi/p5-ssl-tools
+ - added ALPN support (needs OpenSSL1.02, Net::SSLeay 1.56+) thanks to TEAM,
+ RT#101452
+ 2.008 2014/12/16
+ - work around recent OCSP verification errors for revoked.grc.com (badly
signed
+ OCSP response, Firefox also complains about it) in test t/external/ocsp.t.
+ - util/analyze.pl - report more details about preferred cipher for specific
TLS
+ versions
+ 2.007 2014/11/26
+ - make getline/readline fall back to super class if class is not sslified
yet,
+ i.e. behave the same as sysread, syswrite etc.
+ This fixes RT#100529
+ 2.006 2014/11/22
+ - Make (hopefully) non-blocking work on windows by using EWOULDBLOCK instead
of
+ EAGAIN. While this is the same on UNIX it is different on Windows and
socket
+ operations return there (WSA)EWOULDBLOCK and not EAGAIN. Enable
non-blocking
+ tests on Windows too.
+ - make PublicSuffix::_default_data thread safe
+ - update PublicSuffix with latest list from publicsuffix.org
+ 2.005 2014/11/15
+ - next try to fix t/protocol_version.t for OpenSSL w/o SSLv3 support
+ 2.004 2014/11/15
+ - only test fix: fix t/protocol_version.t to deal with OpenSSL installations
+ which are compiled without SSLv3 support.
+ 2.003 2014/11/14
+ - make SSLv3 available even if the SSL library disables it by default in
+ SSL_CTX_new (like done in LibreSSL). Default will stay to disable SSLv3,
+ so this will be only done when setting SSL_version explicitly.
+ - fix possible segmentation fault when trying to use an invalid certificate,
+ reported by Nick Andrew.
+ - Use only the ICANN part of the default public suffix list and not the
+ private domains. This makes existing exceptions for s3.amazonaws.com and
+ googleapis.com obsolete. Thanks to Gervase Markham from mozilla.org.
+ 2.002 2014/10/21
+ - fix check for (invalid) IPv4 when validating hostname against certificate.
Do
+ not use inet_aton any longer because it can cause DNS lookups for malformed
+ IP. RT#99448, thanks to justincase[AT]yopmail[DOT]com.
+ - Update PublicSuffix with latest version from publicsuffix.org - lots of new
+ top level domains.
+ - Add exception to PublicSuffix for s3.amazonaws.com - RT#99702, thanks to
+ cpan[AT]cpanel[DOT]net.
+ 2.001 2014/10/21
+ - Add SSL_OP_SINGLE_(DH|ECDH)_USE to default options to increase PFS
security.
+ Thanks to Heikki Vatiainen for suggesting.
+ - Update external tests with currently expected fingerprints of hosts.
+ - Some fixes to make it still work on 5.8.1.
+ 2.000 2014/10/15
+ - consider SSL3.0 as broken because of POODLE and disable it by default.
+ - Skip live tests without asking if environment NO_NETWORK_TESTING is set.
+ Thanks to ntyni[AT]debian[DOT]org for suggestion.
+ - skip tests which require fork on non-default windows setups without proper
+ fork. Thanks to SHAY for https://github.com/noxxi/p5-io-socket-ssl/pull/18
+ 1.999 2014/10/09
+ - make sure we don't use version 0.30 of IO::Socket::IP
+ - make sure that PeerHost is checked on all places where PeerAddr is
+ checked, because these are synonyms and IO::Socket::IP prefers PeerHost
+ while others prefer PeerAddr. Also accept PeerService additionally to
+ PeerPort.
+ See https://github.com/noxxi/p5-io-socket-ssl/issues/16 for details.
+ - add ability to use client certificates and to overwrite hostname with
+ util/analyze-ssl.pl.
+ 1.998 2014/09/07
+ - make client authentication work at the server side when SNI is in by use
+ having CA path and other settings in all SSL contexts instead of only the
main
+ one. Based on code from lundstrom[DOT]jerry[AT]gmail[DOT]com,
+ https://github.com/noxxi/p5-io-socket-ssl/pull/15
+
+-------------------------------------------------------------------
Old:
----
IO-Socket-SSL-1.997.tar.gz
New:
----
IO-Socket-SSL-2.012.tar.gz
cpanspec.yml
perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ perl-IO-Socket-SSL.spec ++++++
--- /var/tmp/diff_new_pack.3q56f7/_old 2015-04-22 01:12:32.000000000 +0200
+++ /var/tmp/diff_new_pack.3q56f7/_new 2015-04-22 01:12:32.000000000 +0200
@@ -1,7 +1,7 @@
#
# spec file for package perl-IO-Socket-SSL
#
-# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -17,14 +17,16 @@
Name: perl-IO-Socket-SSL
-Version: 1.997
+Version: 2.012
Release: 0
%define cpan_name IO-Socket-SSL
-Summary: Nearly transparent SSL encapsulation for IO::Socket::INET.
+Summary: Nearly transparent SSL encapsulation for IO::Socket::INET
License: Artistic-1.0 or GPL-1.0+
Group: Development/Libraries/Perl
Url: http://search.cpan.org/dist/IO-Socket-SSL/
Source:
http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
+Source1: cpanspec.yml
+Patch:
perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: perl
@@ -76,6 +78,7 @@
%prep
%setup -q -n %{cpan_name}-%{version}
+%patch -p1
%build
%{__perl} Makefile.PL INSTALLDIRS=vendor
@@ -91,6 +94,6 @@
%files -f %{name}.files
%defattr(-,root,root,755)
-%doc BUGS Changes example README README.Win32 util
+%doc BUGS Changes example README README.Win32
%changelog
++++++ IO-Socket-SSL-1.997.tar.gz -> IO-Socket-SSL-2.012.tar.gz ++++++
++++ 7060 lines of diff (skipped)
++++++ cpanspec.yml ++++++
---
patches:
perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch: -p1
++++++ perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch ++++++
Index: IO-Socket-SSL-2.012/lib/IO/Socket/SSL.pm
===================================================================
--- IO-Socket-SSL-2.012.orig/lib/IO/Socket/SSL.pm 2015-02-02
08:44:32.000000000 +0100
+++ IO-Socket-SSL-2.012/lib/IO/Socket/SSL.pm 2015-04-18 11:37:15.730344825
+0200
@@ -129,6 +129,9 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
DHE-DSS-AES128-SHA
DHE-DSS-AES256-SHA256
DHE-DSS-AES256-SHA
+ DHE-RSA-AES128-SHA
+ DHE-RSA-AES256-SHA256
+ DHE-RSA-AES256-SHA
AES128-SHA256
AES128-SHA
AES256-SHA256