The Perl Toolchain Summit needs more sponsors. If your company depends on Perl, please support this very important event.

Changes for version 1.956 - 2013-11-10

  • lots of behavior changes for more secure defaults:
  • BEHAVIOR CHANGE: make default cipher list more secure, especially
    • no longer support MD5 by default (broken)
    • no longer support anonymous authentication by default (vulnerable to man in the middle attacks)
    • prefer ECDHE/DHE ciphers and add necessary ECDH curve and DH keys, so that it uses by default forward secrecy, if underlying Net::SSLeay/openssl supports it
    • move RC4 at the end, e.g. 3DES is prefered (BEAST attack should hopefully been fixed and now RC4 is considered less safe than 3DES)
    • default SSL_honor_cipher_order to 1, e.g. when used as server it tries to get the best cipher even if client preferes other ciphers PLEASE NOTE that this might break connections with older, less secure implementations. In this case revert to 'ALL:!LOW:!EXP:!aNULL' or so.
  • BEHAVIOR CHANGE: SSL_cipher_list now gets set on context not SSL object and thus gets reused if context gets reused. PLEASE NOTE that using SSL_cipher_list together with SSL_reuse_ctx has no longer effect on the ciphers of the context.
  • rework hostname verification schemes
    • add rfc names as scheme (e.g. 'rfc2818',...)
    • add SIP, SNMP, syslog, netconf, GIST
    • BEHAVIOR CHANGE: fix SMTP - now accept wildcards in CN and subjectAltName
    • BEHAVIOR CHANGE: fix IMAP, POP3, ACAP, NNTP - now accept wildcards in CN
  • BEHAVIOR CHANGE: anywhere wildcards like www* now match only 'www1', 'www2'.. but not 'www'
  • anywhere wildcards like x* are no longer applied to IDNA names (which start with 'xn--')
  • fix crash of Utils::CERT_free
  • support TLSv11, TLSv12 as handshake protocols

Modules

SSL sockets with IO::Socket interface
SSL interception (man in the middle)
loading, storing, creating certificates and keys

Provides

in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm