47 Commits

Author SHA1 Message Date
jsing
73eeecb194 Remove LIBRESSL_VERSION_NUMBER related patches that are no longer needed.
ok gsoares@
2019-03-19 16:51:13 +00:00
tb
bec5903648 Clean up some LIBRESSL_VERSION_NUMBER patches that either did nothing
or provided functions that are now available in libcrypto.

ok gsoares, sthen (for a more aggressive earlier version)

I'll revisit the other bits at p2k18.
2018-04-14 09:05:14 +00:00
sthen
d207296dee unbreak now we have SSL_CTX_get_ciphers 2018-02-23 10:26:56 +00:00
gsoares
576043f48e update to 5.44 2017-12-01 00:08:44 +00:00
gsoares
6447d0d401 update to 5.42
OK abieber@
2017-09-12 16:15:24 +00:00
gsoares
0cea3685c6 update to stunnel-5.39 2017-01-09 15:40:30 +00:00
gsoares
75687dd11c enable cert_check_subject() 2016-11-10 10:10:50 +00:00
gsoares
872f76e258 update to 5.37
OK benoit@
2016-11-09 23:14:31 +00:00
gsoares
4c7e0e3b0e update to 5.31
OK kili@
2016-04-24 12:07:48 +00:00
gsoares
e9d2ad4711 update to 5.29 2016-01-13 12:39:55 +00:00
gsoares
54ec9975b3 update to 5.27 2015-12-04 01:38:56 +00:00
gsoares
9606ca610b update to 5.26
builds and runs fine amd64/i386...
2015-11-25 02:37:51 +00:00
gsoares
a842c398ab *** empty log message *** 2015-10-14 02:05:06 +00:00
gsoares
420c7d8871 - update to 3.19;
- switch threading model to pthread since that it is the default process model in stunnel;
- fix stunnel.pem path in pkg/MESSAGE;
- add patches to make it build with libressl;
- fix some hardcoding paths in tools/stunnel.conf-sample.in.

Tweaks and Feedback:
jca@ yasuoka@ jasper@ brad@ and Markus Lude, thanks !

tested by yasuoka@ and Markus Lude on @sparc64(markus's tests against 3.18 version, but no many changes to 3.19, assuming that should work too...)...

full changelog at:
https://www.stunnel.org/sdf_ChangeLog.html
2015-06-25 14:44:30 +00:00
gonzalo
8c44bfa2a4 Update for Stunnel to 5.06:
Security bugfixes

    OpenSSL DLLs updated to version 1.0.1j.
https://www.openssl.org/news/secadv_20141015.txt
    The insecure SSLv2 protocol is now disabled by default. It can be
enabled with "options = -NO_SSLv2".
    The insecure SSLv3 protocol is now disabled by default. It can be
enabled with "options = -NO_SSLv3".
    Default sslVersion changed to "all" (also in FIPS mode) to
autonegotiate the highest supported TLS version.

New features

    Added missing SSL options to match OpenSSL 1.0.1j.
    New "-options" commandline option to display the list of supported
SSL options.

Bugfixes

    Fixed FORK threading build regression bug.


OK gsoares@ (maintainer) OK schwarze@
2014-10-27 13:16:48 +00:00
ajacoutot
8d28dad502 Cope with openssl(1) move from /usr/sbin to /usr/bin
ok landry@
2014-08-27 06:58:00 +00:00
gsoares
05bfcfc5de update to 5.03
OK kili@
2014-08-22 02:22:25 +00:00
sthen
883319840e we don't have RAND_egd 2014-04-19 12:29:02 +00:00
sthen
4291ce340c SECURITY update to stunnel 5.00, fixes an issue similar to libssh and
postgresql where a forked child process doesn't correctly reset RNG state.
See CVE-2014-0016, http://www.openwall.com/lists/oss-security/2014/03/05/1

ok gsoares@

Note from upstream release notes:

"stunnel 5.00 disables some features previously enabled by default.
Users should review whether the new defaults are appropriate for their
particular deployments."

These changes include: FIPS mode, pid file generation and
libwrap disabled by default, and the default cipher list has
been updated to "HIGH:MEDIUM:+3DES:+DH:!aNULL:!SSLv2".
2014-03-17 13:03:11 +00:00
gsoares
3bb2993c2f missing RCS id. 2014-01-03 20:20:58 +00:00
sthen
38fa0cfdea update to stunnel 4.50; use better MASTER_SITES while there. 2011-12-08 13:42:05 +00:00
sthen
1532a55649 update to stunnel 4.49 2011-11-30 19:37:21 +00:00
sthen
9aee28cec4 update to stunnel 4.44 2011-09-19 14:21:02 +00:00
sthen
911192190c update to stunnel 4.43, ok jakob@, reads good to william@
- take maintainer, suggested by jakob
- pid is now created inside the chroot jail, note you may want to set
"pid = /stunnel.pid" in config.
2011-09-15 00:42:21 +00:00
jakob
01b252f4ad update to stunnel v4.27 2009-05-28 18:08:49 +00:00
jakob
1ebf2bd47d upgrade to stunnel v4.26.
also; update patch to write pidfile before dropping privs.
2008-09-22 19:20:01 +00:00
jakob
3f1a16ec6a upgrade stunnel to v4.25 2008-07-15 08:33:49 +00:00
jakob
f867a81633 upgrade to stunnel v4.23 2008-05-14 21:06:15 +00:00
jakob
36da4179bd stunnel v4.18 2006-09-27 15:30:10 +00:00
sturm
65e2fcd425 don't use broken homegrown socketpair() implementation
reported by mayonez at ssnet.xim.pl
2006-08-09 18:44:08 +00:00
aanriot
2ccf94b408 - use the same directory for the key as mentionned in MESSAGE.
- bump PKGNAME.

ok jakob@
2006-04-20 16:01:52 +00:00
jakob
57417add32 stunnel 4.15 2006-03-23 15:49:53 +00:00
jakob
102f09da40 stunnel v4.13 2005-10-22 18:00:32 +00:00
jakob
09b6f25453 stunnel 4.07, misc minor fixes 2005-01-03 08:06:42 +00:00
jakob
bba7bba4d4 poll patch from author 2004-12-28 09:31:05 +00:00
jakob
dd125683b2 stunnel 4.06 2004-12-27 08:24:44 +00:00
jakob
0017031556 update to v4.05
add chroot/privdrop from Michael Schubert
2004-02-16 12:33:18 +00:00
jakob
ddf65a51d8 upgrade to stunnel v4.03. summary of new features:
- new user interface (config file)
- single daemon can listen on multiple ports
- delayed DNS lookup added
- configurable timeouts
- chroot support
- private key file for a certificate can be kept in a separate file
2002-10-30 11:10:35 +00:00
naddy
519def0716 Tentatively enable interactive regress test. 2002-10-28 17:30:52 +00:00
jakob
2e59ffff27 update to v3.21c 2001-11-11 23:04:55 +00:00
jakob
babce676a8 1. change /dev/urandom -> /dev/arandom
2. fix potentially bug and/or hole in implementation of PEM_DIR variable.

from mpech@
2001-08-13 07:28:32 +00:00
jakob
6406622d74 fix broken piddir 2001-01-19 18:39:50 +00:00
jakob
565b70f0a4 update to v3.11 2000-12-27 10:10:08 +00:00
obecian
8e18f618f5 stunnel-3.9 update
Version 3.9, 2000.12.13:
* Updated temporary key generation:
   - stunnel is now honoring requested key-lengths correctly,
   - temporary key is changed every hour.
* transfer() no longer hangs on some platforms.
  Special thanks to Peter Wagemans for the patch.
* Potential security problem with syslog() call fixed.
2000-12-19 05:46:03 +00:00
jakob
69aa4bc85b create pid-files in /var/run 2000-03-20 21:43:47 +00:00
jakob
d2fd1742f5 Update to v3.8
Add licensing
2000-03-05 22:55:44 +00:00
jakob
55c1d659cf SSL encryption wrapper for standard network daemons 1999-12-05 18:25:54 +00:00