From c1f1b41420ea82489e6512d909f1af1325965ed4 Mon Sep 17 00:00:00 2001
From: Paul Howarth <p...@city-fan.org>
Date: Sat, 30 Jan 2016 19:08:57 +0000
Subject: Update to 2.023

- New upstream release 2.023
  - OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS
    connection was not fully established, which somehow resulted in
    Net::SSLeay::shutdown returning 0 (i.e. keep trying) and hence an endless
    loop; it will now ignore this result in case the TLS connection was not
    yet established and consider the TLS connection closed instead
- Update patches as needed
---
 ...-SSL-2.021-use-system-default-SSL-version.patch | 36 ----------------------
 ...-SSL-2.023-use-system-default-SSL-version.patch | 36 ++++++++++++++++++++++
 perl-IO-Socket-SSL.spec                            | 13 ++++++--
 sources                                            |  2 +-
 4 files changed, 48 insertions(+), 39 deletions(-)
 delete mode 100644 IO-Socket-SSL-2.021-use-system-default-SSL-version.patch
 create mode 100644 IO-Socket-SSL-2.023-use-system-default-SSL-version.patch

diff --git a/IO-Socket-SSL-2.021-use-system-default-SSL-version.patch 
b/IO-Socket-SSL-2.021-use-system-default-SSL-version.patch
deleted file mode 100644
index 5f89425..0000000
--- a/IO-Socket-SSL-2.021-use-system-default-SSL-version.patch
+++ /dev/null
@@ -1,36 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -85,7 +85,7 @@ my $algo2digest = do {
- # global defaults
- my %DEFAULT_SSL_ARGS = (
-     SSL_check_crl => 0,
--    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 
as broken
-+    SSL_version => '',
-     SSL_verify_callback => undef,
-     SSL_verifycn_scheme => undef,  # fallback cn verification
-     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
-@@ -2167,7 +2167,7 @@ sub new {
-     $ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE;
-     $ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh;
- 
--    my $ver;
-+    my $ver = '';
-     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
-       m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
-       or croak("invalid SSL_version specified");
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -942,11 +942,12 @@ protocol to the specified version.
- All values are case-insensitive.  Instead of 'TLSv1_1' and 'TLSv1_2' one can
- also use 'TLSv11' and 'TLSv12'.  Support for 'TLSv1_1' and 'TLSv1_2' requires
- recent versions of Net::SSLeay and openssl.
-+The default SSL_version is defined by the underlying cryptographic library.
- 
- Independent from the handshake format you can limit to set of accepted SSL
- versions by adding !version separated by ':'.
- 
--The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
-+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
- handshake format is compatible to SSL2.0 and higher, but that the successful
- handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
- both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.023-use-system-default-SSL-version.patch 
b/IO-Socket-SSL-2.023-use-system-default-SSL-version.patch
new file mode 100644
index 0000000..0354427
--- /dev/null
+++ b/IO-Socket-SSL-2.023-use-system-default-SSL-version.patch
@@ -0,0 +1,36 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -85,7 +85,7 @@ my $algo2digest = do {
+ # global defaults
+ my %DEFAULT_SSL_ARGS = (
+     SSL_check_crl => 0,
+-    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 
as broken
++    SSL_version => '',
+     SSL_verify_callback => undef,
+     SSL_verifycn_scheme => undef,  # fallback cn verification
+     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
+@@ -2172,7 +2172,7 @@ sub new {
+     $ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE;
+     $ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh;
+ 
+-    my $ver;
++    my $ver = '';
+     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
+       m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
+       or croak("invalid SSL_version specified");
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -942,11 +942,12 @@ protocol to the specified version.
+ All values are case-insensitive.  Instead of 'TLSv1_1' and 'TLSv1_2' one can
+ also use 'TLSv11' and 'TLSv12'.  Support for 'TLSv1_1' and 'TLSv1_2' requires
+ recent versions of Net::SSLeay and openssl.
++The default SSL_version is defined by the underlying cryptographic library.
+ 
+ Independent from the handshake format you can limit to set of accepted SSL
+ versions by adding !version separated by ':'.
+ 
+-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
++For example, 'SSLv23:!SSLv3:!SSLv2' means that the
+ handshake format is compatible to SSL2.0 and higher, but that the successful
+ handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
+ both of these versions have serious security issues and should not be used
diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec
index 5c123ac..370bc71 100644
--- a/perl-IO-Socket-SSL.spec
+++ b/perl-IO-Socket-SSL.spec
@@ -1,5 +1,5 @@
 Name:          perl-IO-Socket-SSL
-Version:       2.022
+Version:       2.023
 Release:       1%{?dist}
 Summary:       Perl library for transparent SSL
 Group:         Development/Libraries
@@ -7,7 +7,7 @@ License:        GPL+ or Artistic
 URL:           http://search.cpan.org/dist/IO-Socket-SSL/
 Source0:       
http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
 Patch0:                IO-Socket-SSL-2.021-use-system-default-cipher-list.patch
-Patch1:                IO-Socket-SSL-2.021-use-system-default-SSL-version.patch
+Patch1:                IO-Socket-SSL-2.023-use-system-default-SSL-version.patch
 BuildRoot:     %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
 BuildArch:     noarch
 # Module Build
@@ -115,6 +115,15 @@ rm -rf %{buildroot}
 %{_mandir}/man3/IO::Socket::SSL::Utils.3*
 
 %changelog
+* Sat Jan 30 2016 Paul Howarth <p...@city-fan.org> - 2.023-1
+- Update to 2.023
+  - OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS
+    connection was not fully established, which somehow resulted in
+    Net::SSLeay::shutdown returning 0 (i.e. keep trying) and hence an endless
+    loop; it will now ignore this result in case the TLS connection was not
+    yet established and consider the TLS connection closed instead
+- Update patches as needed
+
 * Thu Dec 10 2015 Paul Howarth <p...@city-fan.org> - 2.022-1
 - Update to 2.022
   - Fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash
diff --git a/sources b/sources
index 9877046..bd22d08 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-a5f284d543aec4a6fcd595eb5fc8898b  IO-Socket-SSL-2.022.tar.gz
+89df81cbc1c477937fdcfa8fea173a48  IO-Socket-SSL-2.023.tar.gz
-- 
cgit v0.11.2


        
http://pkgs.fedoraproject.org/cgit/perl-IO-Socket-SSL.git/commit/?h=perl-IO-Socket-SSL-2.023-1.fc23&id=c1f1b41420ea82489e6512d909f1af1325965ed4
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/perl-devel@lists.fedoraproject.org

Reply via email to