From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Subject: [PATCH] stunnel: Update to version 5.71
Date: Thu, 18 Jan 2024 12:40:29 +0100 [thread overview]
Message-ID: <20240118114031.6171-12-adolf.belka@ipfire.org> (raw)
In-Reply-To: <20240118114031.6171-1-adolf.belka@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 3018 bytes --]
- Update from vesrion 5.69 to 5.71
- Update of rootfile not required
- Changelog
5.71, 2023.09.19, urgency: MEDIUM
Security bugfixes
- OpenSSL DLLs updated to version 3.1.3.
Bugfixes
- Fixed the console output of tstunnel.exe.
Features sponsored by SAE IT-systems
- OCSP stapling is requested and verified in the client mode.
- Using "verifyChain" automatically enables OCSP
stapling in the client mode.
- OCSP stapling is always available in the server mode.
- An inconclusive OCSP verification breaks TLS negotiation.
This can be disabled with "OCSPrequire = no".
- Added the "TIMEOUTocsp" option to control the maximum
time allowed for connecting an OCSP responder.
Features
- Added support for Red Hat OpenSSL 3.x patches.
5.70, 2023.07.12, urgency: HIGH
Security bugfixes
- OpenSSL DLLs updated to version 3.0.9.
- OpenSSL FIPS Provider updated to version 3.0.8.
Bugfixes
- Fixed TLS socket EOF handling with OpenSSL 3.x.
This bug caused major interoperability issues between
stunnel built with OpenSSL 3.x and Microsoft's
Schannel Security Support Provider (SSP).
- Fixed reading certificate chains from PKCS#12 files.
Features
- Added configurable delay for the "retry" option.
Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
---
lfs/stunnel | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/lfs/stunnel b/lfs/stunnel
index 24527bb25..61d1fe4a1 100644
--- a/lfs/stunnel
+++ b/lfs/stunnel
@@ -1,7 +1,7 @@
###############################################################################
# #
# IPFire.org - A linux based firewall #
-# Copyright (C) 2007-2023 IPFire Team <info(a)ipfire.org> #
+# Copyright (C) 2007-2024 IPFire Team <info(a)ipfire.org> #
# #
# This program is free software: you can redistribute it and/or modify #
# it under the terms of the GNU General Public License as published by #
@@ -24,7 +24,7 @@
include Config
-VER = 5.69
+VER = 5.71
SUMMARY = Universal TLS Tunnel
THISAPP = stunnel-$(VER)
@@ -33,7 +33,7 @@ DL_FROM = $(URL_IPFIRE)
DIR_APP = $(DIR_SRC)/$(THISAPP)
TARGET = $(DIR_INFO)/$(THISAPP)
PROG = stunnel
-PAK_VER = 11
+PAK_VER = 12
DEPS =
@@ -47,7 +47,7 @@ objects = $(DL_FILE)
$(DL_FILE) = $(DL_FROM)/$(DL_FILE)
-$(DL_FILE)_BLAKE2 = fd213d1c7bc9efb42ee501bccd720c6535d123fe9d78354ff14a1701edcc30f1b563ff46fa34fd3f53bb976a7e700f0cd63589a8488738314604e593a95ad7bd
+$(DL_FILE)_BLAKE2 = d323363c7bfdd6c0b7931b84a6069cf9a8337e967c31e14d15976d7932f0c0d6f40f7a1cbf5abbdff0e9edc52176cdcead4f848653088193b2debf4e77443b42
install : $(TARGET)
--
2.43.0
next prev parent reply other threads:[~2024-01-18 11:40 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-01-18 11:40 [PATCH] bird: Update to version 2.14 Adolf Belka
2024-01-18 11:40 ` [PATCH] dmidecode: Update to version 3.5 Adolf Belka
2024-01-18 11:40 ` [PATCH] fmt: Update to version 10.2.1 Adolf Belka
2024-01-18 11:40 ` [PATCH] haproxy: Update to version 2.9.2 Adolf Belka
2024-01-18 11:40 ` [PATCH] ipset: Update to version 7.19 Adolf Belka
2024-01-18 11:40 ` [PATCH] libtalloc: Update to version 2.4.1 Adolf Belka
2024-01-18 11:40 ` [PATCH] libvirt: Update to version 10.0.0 Adolf Belka
2024-01-18 11:40 ` [PATCH] lshw: Update to version B.02.20 Adolf Belka
2024-01-18 11:40 ` [PATCH] memtest: Update to version 7.00 Adolf Belka
2024-01-18 11:40 ` [PATCH] pixman: Update to version 43.0 Adolf Belka
2024-01-18 11:40 ` [PATCH] poppler: Update to version 24.01.0 Adolf Belka
2024-01-18 11:40 ` Adolf Belka [this message]
2024-01-18 11:40 ` [PATCH] transmission: Update to version 4.0.5 Adolf Belka
2024-01-18 11:40 ` [PATCH] wavemon: Update to version 0.9.5 Adolf Belka
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240118114031.6171-12-adolf.belka@ipfire.org \
--to=adolf.belka@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox