stunnel-5.70-150600.3.3.1<>,fqRp9|ʃtGЎvVDOpΞS{6dpoh{C8cN(y˘CfB}*&:אY7R.EEk' :wad3N]3"5訳/->+͋.%¬D Vby X)]d?V|@M`PjV#2 Ė.[<~~>1XO?d   1LP\`y  0 ^    rd%8%D%(879x7: 7=>?@FGHdIXY\ ]|^Vblcdefluvw4xyzHX\dhlxCstunnel5.70150600.3.3.1Universal TLS TunnelStunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs' code. Its architecture is optimized for security, portability, and scalability (including load-balancing), making it suitable for large deployments.fqRh01-ch4d SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/Productivity/Networking/Securityhttps://www.stunnel.org/linuxx86_64if ! /usr/bin/getent passwd stunnel >/dev/null; then /usr/sbin/useradd -r -c "Daemon user for stunnel (universal SSL tunnel)" -g nogroup -s /bin/false \ -d /var/lib/stunnel stunnel fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in stunnel.service ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in stunnel.service ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi PNAME=syslog SUBPNAME=-stunnel SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable stunnel.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop stunnel.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in stunnel.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart stunnel.service ) || : fi fiO 9CKAAA큤A큤AAAAAAAAfqQfqQfqQfqQfqQfqQfqQfqQfqQfqQHfqQcͥ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-5.70-150600.3.3.1.src.rpmconfig(stunnel)libstunnel.so()(64bit)stunnelstunnel(x86-64) @@@@@@@@@@@@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/perl/usr/sbin/useraddconfig(stunnel)coreutilsdiffutilsfileutilsfillupgrepgroup(nogroup)libc.so.6()(64bit)libc.so.6(GLIBC_2.10)(64bit)libc.so.6(GLIBC_2.11)(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.32)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.9)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libssl.so.3()(64bit)libssl.so.3(OPENSSL_3.0.0)(64bit)libwrap.so.0()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)textutils5.70-150600.3.3.13.0.4-14.6.0-14.0-15.2-14.14.3fͿd@d@ds@dI@d*cca @c@bK@bbv_@b7@b@a)@a`u`n@`lM@`2K@`@___C^g@^W@^8 @]{]{\o@[[ZyZs@Zhu@Z@Y@YoIX-Xߖ@X@XXj@XIK@XkXWv@VVvUL@Uc@UnUU3@TZ@meissner@suse.compmonreal@suse.compmonreal@suse.comvetter@physik.uni-wuerzburg.devetter@physik.uni-wuerzburg.dedmueller@suse.compmonreal@suse.commichael@stroeder.comdmueller@suse.compmonreal@suse.compgajdos@suse.comdmueller@suse.comdmueller@suse.compmonreal@suse.comjsegitz@suse.comvetter@physik.uni-wuerzburg.deopensuse@dstoecker.devetter@physik.uni-wuerzburg.deandreas.stieger@gmx.devetter@physik.uni-wuerzburg.deopensuse@dstoecker.devetter@physik.uni-wuerzburg.demichael@stroeder.comdmueller@suse.comvetter@physik.uni-wuerzburg.devetter@physik.uni-wuerzburg.dedimstar@opensuse.orgvcizek@suse.comvcizek@suse.comfbui@suse.comobs@botter.ccobs@botter.ccvetter@physik.uni-wuerzburg.dejengelh@inai.deavindra@opensuse.orgrbrown@suse.comvetter@physik.uni-wuerzburg.demichael@stroeder.comwerner@suse.demichael@stroeder.comkukuk@suse.demichael@stroeder.commichael@stroeder.commichael@stroeder.comjengelh@inai.dedrahn@suse.comdrahn@suse.commichael@stroeder.comopensuse@dstoecker.dedrahn@suse.comdrahn@suse.comdrahn@suse.comdrahn@suse.comdrahn@suse.commichael@stroeder.com- stunnel-fips-1403.patch: Disable X25519 and X448 elliptic curves for now not valid in FIPS 140-3 (bsc#1229826)- Enable crypto-policies support: [bsc#1211301] * The system's crypto-policies are the best source to determine which cipher suites to accept in TLS. OpenSSL supports the PROFILE=SYSTEM setting to use those policies. Change stunnel to default to the system settings. * Add patches: - stunnel-5.69-system-ciphers.patch - stunnel-5.69-default-tls-version.patch- Enable bash completion support- Update to 5.70: - Security bugfixes * OpenSSL DLLs updated to version 3.0.9. * OpenSSL FIPS Provider updated to version 3.0.8. - Bugfixes * Fixed TLS socket EOF handling with OpenSSL 3.x. This bug caused major interoperability issues between stunnel built with OpenSSL 3.x and Microsoft's Schannel Security Support Provider (SSP). * Fixed reading certificate chains from PKCS#12 files. - Features * Added configurable delay for the "retry" option.- Fix build on SLE12: - add macro make_build- update to 5.69: * Improved logging performance with the "output" option. * Improved file read performance on the WIN32 platform. * DH and kDHEPSK ciphersuites removed from FIPS defaults. * Set the LimitNOFILE ulimit in stunnel.service to allow * for up to 10,000 concurrent clients. * Fixed the "CApath" option on the WIN32 platform by * applying https://github.com/openssl/openssl/pull/20312. * Fixed stunnel.spec used for building rpm packages. * Fixed tests on some OSes and architectures by merging- Update to 5.68: * Security bugfixes - OpenSSL DLLs updated to version 3.0.8. * New features - Added the new 'CAengine' service-level option to load a trusted CA certificate from an engine. - Added requesting client certificates in server mode with 'CApath' besides 'CAfile'. * Bugfixes - Fixed EWOULDBLOCK errors in protocol negotiation. - Fixed handling TLS errors in protocol negotiation. - Prevented following fatal TLS alerts with TCP resets. - Improved OpenSSL initialization on WIN32. - Improved testing suite stability. - Improved file read performance. - Improved logging performance.- Update to 5.67 * New features - Provided a logging callback to custom engines. * Bugfixes - Fixed "make cert" with OpenSSL older than 3.0. - Fixed the code and the documentation to use conscious language for SNI servers (thx to Clemens Lang).- update to 5.66: * Fixed building on machines without pkg-config. * Added the missing "environ" declaration for BSD-based operating systems. * Fixed the passphrase dialog with OpenSSL 3.0. - package license - remove non-systemd case from spec file- Update to 5.65: * Security bugfixes - OpenSSL DLLs updated to version 3.0.5. * Bugfixes - Fixed handling globally enabled FIPS. - Fixed openssl.cnf processing in WIN32 GUI. - Fixed a number of compiler warnings. - Fixed tests on older versions of OpenSSL.- adding missing bug, CVE and fate references: * CVE-2015-3644 [bsc#931517], one of previous version updates (https://bugzilla.suse.com/show_bug.cgi?id=931517#c0) * [bsc#990797], see stunnel.service.in * [bsc#862294], README.SUSE not shipped * CVE-2013-1762 [bsc#807440], one of previous version updates (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762) * [bsc#776756] and [bsc#775262] not applicable (openssl versions) * [fate#307180], adding to 11sp1 * [fate#311400], updating to new version * [fate#314256], updating to new version- update to 5.64: * Security bugfixes - OpenSSL DLLs updated to version 3.0.3. * New features - Updated the pkcs11 engine for Windows. * Bugfixes - Removed the SERVICE_INTERACTIVE_PROCESS flag in "stunnel -install".- update to 5.63: * Security bugfixes - OpenSSL DLLs updated to version 3.0.2. * New features - Updated stunnel.spec to support bash completion * Bugfixes - Fixed possible PRNG initialization crash (thx to Gleydson Soares).- Update to 5.62: * New features - Added a bash completion script. * Bugfixes - Fixed a transfer() loop bug. - Update to 5.61: * New features - Added new "protocol = capwin" and "protocol = capwinctrl" configuration file options. - Rewritten the testing framework in python. - Added support for missing SSL_set_options() values. - Updated stunnel.spec to support RHEL8. * Bugfixes - Fixed OpenSSL 3.0 build. - Fixed reloading configuration with "systemctl reload stunnel.service". - Fixed incorrect messages logged for OpenSSL errors. - Fixed printing IPv6 socket option defaults on FreeBSD. - Rebase harden_stunnel.service.patch - Remove FIPS-related regression tests - Remove obsolete version checks- Added hardening to systemd service(s) (bsc#1181400). Added patch(es): * harden_stunnel.service.patch- Update to 5.60: * New features - New 'sessionResume' service-level option to allow or disallow session resumption - Added support for the new SSL_set_options() values. - Download fresh ca-certs.pem for each new release. * Bugfixes - Fixed 'redirect' with 'protocol'. This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.- ensure proper startup after network: stunnel-5.59_service_always_after_network.patch- Disable testsuite for everything except Tumbleweed since it does not work on Leap/SLE- update to 5.59: * new feature: Client-side "protocol = ldap" support * Fix configuration reload when compression is used * Fix paths in generated manuals * Fix test suite fixed not to require external connectivity - run testsuite during package build- Update to 5.58: * Security bugfixes - The "redirect" option was fixed to properly handle unauthenticated requests (thx to Martin Stein). boo#1182529 - Fixed a double free with OpenSSL older than 1.1.0 (thx to Petr Strukov). * New features - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers. This feature can be used to impersonate other software (e.g. web browsers). - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value. - Initial FIPS 3.0 support. * Bugfixes - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates. - Fixed a tiny memory leak in configuration file reload error handling (thx to Richard Könning). - Merged Debian 05-typos.patch (thx to Peter Pentchev). - Merged with minor changes Debian 06-hup-separate.patch (thx to Peter Pentchev). - Merged Debian 07-imap-capabilities.patch (thx to Ansgar). - Merged Debian 08-addrconfig-workaround.patch (thx to Peter Pentchev). - Fixed engine initialization (thx to Petr Strukov). - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.- Do not replace the active config file: boo#1182376- Remove pidfile from service file fixes start bug: boo#1178533- update to 5.57: * Security bugfixes - The "redirect" option was fixed to properly handle "verifyChain = yes" boo#1177580 * New features - New securityLevel configuration file option. - Support for modern PostgreSQL clients - TLS 1.3 configuration updated for better compatibility. * Bugfixes - Fixed a transfer() loop bug. - Fixed memory leaks on configuration reloading errors. - DH/ECDH initialization restored for client sections. - Delay startup with systemd until network is online. - A number of testing framework fixes and improvements.- update to 5.56: - Various text files converted to Markdown format. - Support for realpath(3) implementations incompatible with POSIX.1-2008, such as 4.4BSD or Solaris. - Support for engines without PRNG seeding methods (thx to Petr Mikhalitsyn). - Retry unsuccessful port binding on configuration file reload. - Thread safety fixes in SSL_SESSION object handling. - Terminate clients on exit in the FORK threading model.- Fixup stunnel.conf handling: * Remove old static openSUSE provided stunnel.conf. * Use upstream stunnel.conf and tailor it for openSUSE using sed. * Don't show README.openSUSE when installing.- enable /etc/stunnel/conf.d - re-enable openssl.cnf- BuildRequire pkgconfig(systemd) instead of systemd: allow OBS to shortcut through the -mini flavors.- Install the correct file as README.openSUSE (bsc#1150730) * stunnel.keyring was accidentally installed instead- update to version 5.55 New features New "ticketKeySecret" and "ticketMacSecret" options to control confidentiality and integrity protection of the issued session tickets. These options allow for session resumption on other nodes in a cluster. Logging of the assigned bind address instead of the requested bind address. Check whether "output" is not a relative file name. Added sslVersion, sslVersionMin and sslVersionMax for OpenSSL 1.1.0 and later. Hexadecimal PSK keys are automatically converted to binary. Session ticket support (requires OpenSSL 1.1.1 or later). "connect" address persistence is currently unsupported with session tickets. SMTP HELO before authentication (thx to Jacopo Giudici). New "curves" option to control the list of elliptic curves in OpenSSL 1.1.0 and later. New "ciphersuites" option to control the list of permitted TLS 1.3 ciphersuites. Include file name and line number in OpenSSL errors. Compatibility with the current OpenSSL 3.0.0-dev branch. Better performance with SSL_set_read_ahead()/SSL_pending(). Bugfixes A number of testing framework fixes and improvements. Service threads are terminated before OpenSSL cleanup to prevent occasional stunnel crashes at shutdown. Fixed data transfer stalls introduced in stunnel 5.51. Fixed a transfer() loop bug introduced in stunnel 5.51. Fixed PSKsecrets as a global option (thx to Teodor Robas). Fixed a memory allocation bug (thx to matanfih). Fixed PSK session resumption with TLS 1.3. Fixed a memory leak in the WIN32 logging subsystem. Allow for zero value (ignored) TLS options. Partially refactored configuration file parsing and logging subsystems for clearer code and minor bugfixes. Caveats We removed FIPS support from our standard builds. FIPS will still be available with custom builds. - drop stunnel-listenqueue-option.patch Its original purpose (from bsc#674554) was to allow setting a higher backlog value for listen(). As that value was raised to SOMAXCONN years ago (in 4.36), we don't need it anymore- Drop use of $FIRST_ARG in .spec The use of $FIRST_ARG was probably required because of the %service_* rpm macros were playing tricks with the shell positional parameters. This is bad practice and error prones so let's assume that no macros should do that anymore and hence it's safe to assume that positional parameters remains unchanged after any rpm macro call.- disabled checks; checks depend on ncat and network accessibility- update to version 5.49 * Logging of negotiated or resumed TLS session IDs (thx to ANSSI - National Cybersecurity Agency of France). * Merged Debian 10-enabled.patch and 11-killproc.patch (thx to Peter Pentchev). * OpenSSL DLLs updated to version 1.0.2p. * PKCS#11 engine DLL updated to version 0.4.9. * Fixed a crash in the session persistence implementation. * Fixed syslog identifier after configuration file reload. * Fixed non-interactive "make check" invocations. * Fixed reloading syslog configuration. * stunnel.pem created with SHA-256 instead of SHA-1. * SHA-256 "make check" certificates. - includes new version 5.48 * Fixed requesting client certificate when specified as a global option. * Certificate subject checks modified to accept certificates if at least one of the specified checks matches. - includes new version 5.47 * Fast add_lock_callback for OpenSSL < 1.1.0. This largely improves performance on heavy load. * Automatic detection of Homebrew OpenSSL. * Clarified port binding error logs. * Various "make test" improvements. * Fixed a crash on switching to SNI slave sections. - includes new version 5.46 * The default cipher list was updated to a safer value: "HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK". * Default accept address restored to INADDR_ANY. - includes new version 5.45 * Implemented delayed deallocation of service sections after configuration file reload. * OpenSSL DLLs updated to version 1.0.2o. * Deprecated the sslVersion option. * The "socket" option is now also available in service sections. * Implemented try-restart in the SysV init script (thx to Peter Pentchev). * TLS 1.3 compliant session handling for OpenSSL 1.1.1. * Default "failover" value changed from "rr" to "prio". * New "make check" tests. * A service no longer refuses to start if binding fails for some (but not all) addresses:ports. * Fixed compression handling with OpenSSL 1.1.0 and later. * _beginthread() replaced with safer _beginthreadex(). * Fixed exception handling in libwrap. * Fixed exec+connect services. * Fixed automatic resolver delaying. * Fixed a Gentoo cross-compilation bug (thx to Joe Harvell). * A number of "make check" framework fixes. * Fixed false postive memory leak logs. * Build fixes for OpenSSL versions down to 0.9.7. * Fixed (again) round-robin failover in the FORK threading model.- Revamp SLE11 builds- Do not ignore errors from useradd. Ensure nogroup exists beforehand. - Replace old $RPM_ variables. Combine two nested ifs.- update to version 5.44 * Default accept address restored to INADDR_ANY * Fix race condition in "make check" * Fix removing the pid file after configuration reload - includes 5.43 * Allow for multiple "accept" ports per section * Self-test framework (make check) * Added config load before OpenSSL init * OpenSSL 1.1.1-dev compilation fixes * Fixed round-robin failover in the FORK threading model * Fixed handling SSL_ERROR_ZERO_RETURN in SSL_shutdown() * Minor fixes of the logging subsystem * OpenSSL DLLs updated to version 1.0.2m - add new checking to build - rebase stunnel-listenqueue-option.patch - Cleanup with spec-cleaner- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- add more verbose change log: Version 5.42, 2017.07.16, urgency: HIGH - New features * "redirect" also supports "exec" and not only "connect". * PKCS#11 engine DLL updated to version 0.4.7. - Bugfixes * Fixed premature cron thread initialization causing hangs. * Fixed "verifyPeer = yes" on OpenSSL <= 1.0.1. * Fixed pthreads support on OpenSolaris.- update to version 5.42- Require package config for libsystemd to help the configure script to detect and enable systemd socket activation (boo#1032557) - Refresh patch stunnel-listenqueue-option.patch- update to version 5.41- Don't require insserv if we don't use it- update to version 5.40- update to version 5.39- update to version 5.38- Update rpm group and description and make -doc noarch - Do not suppress errors from useradd - Remove redundant %clean section- update to version 5.36 - Removed direct zlib dependency.- update to version 5.35 - repackage source as bz2 - adjust systemd unit file to start after network-online.target - bugixes: * Fixed incorrectly enforced client certificate requests. * Fixed thread safety of the configuration file reopening. * Fixed malfunctioning "verify = 4". * Only reset the watchdog if some data was actually transferred. * Fixed logging an incorrect value of the round-robin starting point (thx to Jose Alf.). - new features: * Added three new service-level options: requireCert, verifyChain, and verifyPeer for fine-grained certificate verification control. * SNI support also enabled on OpenSSL 0.9.8f and later (thx to Guillermo Rodriguez Garcia). * Added support for PKCS #12 (.p12/.pfx) certificates (thx to Dmitry Bakshaev). * New "socket = a:IPV6_V6ONLY=yes" option to only bind IPv6. * Added logging the list of client CAs requested by the server.- update to 5.30 New features Improved compatibility with the current OpenSSL 1.1.0-dev tree. Added OpenSSL autodetection for the recent versions of Xcode. Bugfixes Fixed references to /etc removed from stunnel.init.in. Stopped even trying -fstack-protector on unsupported platforms (thx to Rob Lockhart).- update to 5.29 - system script restarts stunnel after a crash - readd rcstunnel macro for systemd systems - drop stunnel-ocsp-host.patch (included upstream)- stunnel-ocsp-host.patch: Fix compatibility issues with older OpenSSL versions. Replaces stunnel-5.22-code11-openssl-compat.diff.- update to version 5.22 New features - "OCSPaia = yes" added to the configuration file templates. - Improved double free detection. Bugfixes - Fixed a number of OCSP bugs. The most severe of those bugs caused stunnel to treat OCSP responses that failed OCSP_basic_verify() checks as if they were successful. - Fixed the passive IPv6 resolver (broken in stunnel 5.21). - Remove executable bit from sample scripts - stunnel-5.22-code11-openssl-compat.diff: Compatibility for openssl on CODE11- update to version 5.21 New features - Signal names are displayed instead of numbers. - First resolve IPv4 addresses on passive resolver requests. - More elaborate descriptions were added to the warning about using "verify = 2" without "checkHost" or "checkIP". - Performance optimization was performed on the debug code. Bugfixes - Fixed the FORK and UCONTEXT threading support. - Fixed "failover=prio" (broken since stunnel 5.15). - Added a retry when sleep(3) was interrupted by a signal in the cron thread scheduler.- update to version 5.20 New features - The SSL library detection algorithm was made a bit smarter. - Warnings about insecure authentication were modified to include the name of the affected service section. - Documentation updates (closes Debian bug #781669). Bugfixes - Signal pipe reinitialization added to prevent turning the main accepting thread into a busy wait loop when an external condition breaks the signal pipe. This bug was found to surface on Win32, but other platforms may also be affected. - Generated temporary DH parameters are used for configuration reload instead of the static defaults. - Fixed the manual page headers (thx to Gleydson Soares).- update to version 5.19 Bugfixes: - Improved socket error handling. - Fixed handling of dynamic connect targets. - Fixed handling of trailing whitespaces in the Content-Length header of the NTLM authentication. - Fixed memory leaks in certificate verification. New features: - The "redirect" option was improved to not only redirect sessions established with an untrusted certificate, but also sessions established without a client certificate. - Randomize the initial value of the round-robin counter. - Added "include" configuration file option to include all configuration file parts located in a specified directory. - Temporary DH parameters are refreshed every 24 hours, unless static DH parameters were provided in the certificate file. - Warnings are logged on potentially insecure authentication. - stunnel-listenqueue-option.patch: Refresh. - stunnel3-binpath.patch: Obsolete, dropped. - stunnel.service: Modified to start after network.target, not syslog.target.- Update to version 5.09 Version 5.09, 2015.01.02, urgency: LOW: * New features - Added PSK authentication with two new service-level configuration file options "PSKsecrets" and "PSKidentity". - Added additional security checks to the OpenSSL memory management functions. - Added support for the OPENSSL_NO_OCSP and OPENSSL_NO_ENGINE OpenSSL configuration flags. - Added compatibility with the current OpenSSL 1.1.0-dev tree. * Bugfixes - Removed defective s_poll_error() code occasionally causing connections to be prematurely closed (truncated). This bug was introduced in stunnel 4.34. - Fixed ./configure systemd detection (thx to Kip Walraven). - Fixed ./configure sysroot detection (thx to Kip Walraven). - Fixed compilation against old versions of OpenSSL. - Removed outdated French manual page. Version 5.08, 2014.12.09, urgency: MEDIUM: * New features - Added SOCKS4/SOCKS4a protocol support. - Added SOCKS5 protocol support. - Added SOCKS RESOLVE [F0] TOR extension support. - Updated automake to version 1.14.1. - OpenSSL directory searching is now relative to the sysroot. * Bugfixes - Fixed improper hangup condition handling. - Fixed missing -pic linker option. This is required for Android 5.0 and improves security. Version 5.07, 2014.11.01, urgency: MEDIUM: * New features - Several SMTP server protocol negotiation improvements. - Added UTF-8 byte order marks to stunnel.conf templates. - DH parameters are no longer generated by "make cert". The hardcoded DH parameters are sufficiently secure, and modern TLS implementations will use ECDH anyway. - Updated manual for the "options" configuration file option. - Added support for systemd 209 or later. - New --disable-systemd ./configure option. - setuid/setgid commented out in stunnel.conf-sample. * Bugfixes - Added support for UTF-8 byte order mark in stunnel.conf. - Compilation fix for OpenSSL with disabled SSLv2 or SSLv3. - Non-blocking mode set on inetd and systemd descriptors. - shfolder.h replaced with shlobj.h for compatibility with modern Microsoft compilers. Version 5.06, 2014.10.15, urgency: HIGH: * Security bugfixes - OpenSSL DLLs updated to version 1.0.1j. https://www.openssl.org/news/secadv_20141015.txt - The insecure SSLv2 protocol is now disabled by default. It can be enabled with "options = -NO_SSLv2". - The insecure SSLv3 protocol is now disabled by default. It can be enabled with "options = -NO_SSLv3". - Default sslVersion changed to "all" (also in FIPS mode) to autonegotiate the highest supported TLS version. * New features - Added missing SSL options to match OpenSSL 1.0.1j. - New "-options" commandline option to display the list of supported SSL options. * Bugfixes - Fixed FORK threading build regression bug. - Fixed missing periodic Win32 GUI log updates. Version 5.05, 2014.10.10, urgency: MEDIUM: * New features - Asynchronous communication with the GUI thread for faster logging on Win32. - systemd socket activation (thx to Mark Theunissen). - The parameter of "options" can now be prefixed with "-" to clear an SSL option, for example: "options = -LEGACY_SERVER_CONNECT". - Improved "transparent = destination" manual page (thx to Vadim Penzin). * Bugfixes - Fixed POLLIN|POLLHUP condition handling error resulting in prematurely closed (truncated) connection. - Fixed a null pointer dereference regression bug in the "transparent = destination" functionality (thx to Vadim Penzin). This bug was introduced in stunnel 5.00. - Fixed startup thread synchronization with Win32 GUI. - Fixed erroneously closed stdin/stdout/stderr if specified as the -fd commandline option parameter. - A number of minor Win32 GUI bugfixes and improvements. - Merged most of the Windows CE patches (thx to Pierre Delaage). - Fixed incorrect CreateService() error message on Win32. - Implemented a workaround for defective Cygwin file descriptor passing breaking the libwrap support: http://wiki.osdev.org/Cygwin_Issues#Passing_file_descriptors Version 5.04, 2014.09.21, urgency: LOW: * New features - Support for local mode ("exec" option) on Win32. - Support for UTF-8 config file and log file. - Win32 UTF-16 build (thx to Pierre Delaage for support). - Support for Unicode file names on Win32. - A more explicit service description provided for the Windows SCM (thx to Pierre Delaage). - TCP/IP dependency added for NT service in order to prevent initialization failure at boot time. - FIPS canister updated to version 2.0.8 in the Win32 binary build. * Bugfixes - load_icon_default() modified to return copies of default icons instead of the original resources to prevent the resources from being destroyed. - Partially merged Windows CE patches (thx to Pierre Delaage). - Fixed typos in stunnel.init.in and vc.mak. - Fixed incorrect memory allocation statistics update in str_realloc(). - Missing REMOTE_PORT environmental variable is provided to processes spawned with "exec" on Unix platforms. - Taskbar icon is no longer disabled for NT service. - Fixed taskbar icon initialization when commandline options are specified. - Reportedly more compatible values used for the dwDesiredAccess parameter of the CreateFile() function (thx to Pierre Delaage). - A number of minor Win32 GUI bugfixes and improvements./bin/sh/bin/sh/bin/sh/bin/shh01-ch4d 1725002066 5.70-150600.3.3.15.70-150600.3.3.15.70-150600.3.3.1 stunnelconf.dstunnel.confstunnel.servicestunnellibstunnel.sorcstunnelstunnelstunnel3stunnel.bashsysconfig.syslog-stunnelstunnelCOPYING.mdstunnel.8.gzstunnel.pl.8.gzstunnelbindevetclib64sbinvarrun/etc//etc/stunnel//usr/lib/systemd/system//usr/lib64//usr/lib64/stunnel//usr/sbin//usr/share/bash-completion/completions//usr/share/fillup-templates//usr/share/licenses//usr/share/licenses/stunnel//usr/share/man/man8//var/lib//var/lib/stunnel//var/lib/stunnel/var/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35423/SUSE_SLE-15-SP6_Update/6b74bf1eaf920726614c2961d9df570d-stunnel.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxdirectoryUTF-8 Unicode (with BOM) textASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=c40870e866e6351d464c4c584a0109d7d8696281, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e1c991cfa17fbff86f4992fa9febc66081139952, for GNU/Linux 3.2.0, strippedPerl script text executabletroff or preprocessor input, UTF-8 Unicode text, with very long lines (gzip compressed data, max compression, from Unix)PRR RRRRRRRRRRRRRRRRRRR RUխy}systemdstunnel-doc5.70systemdsystemd-sysvcompatutf-8c037edb6842fe2feb9b2a9db602f4eb26d7d0b16b337544ba138965f0455c1aa?7zXZ !t//f,]"k%jzIwqs93Ŵ0fqMdrHmrȆoydȭۋPp^5méI;KP.s9- &:2EՓBgiJ8R !6tY`WeqKٶ)ūMMR ')_RcT f!jȦ6,%ڋcqJ*%V݈E`PNy\Sx B JssL%{UU-JdnYwPA]Iwybf\T:~*)=Ԏ .py$-RsOC+FO D.ŽYskj%?2A{ ,$R"Ncu!9iQ#g*y^\3 =?C*xH=婁3a++%MΝm޳T]T?ٕl6']$f+~ _lU͒[DЄ;6O糁%yyZ>ɢ ӕj|TU>MAej~*/,)(=i% O;^4_ac=-sK 7s7\ j)G+"iK DF_hBzrh)dӒ9I| ڴŕZucF ?)u3iA8YïPn;Ct -5ȾaDęr9ErHx B6}"ڇl< r)L9Mf! ]>~䳰#^H 0,|+b;30' /pPF8#m S:jsH_˱m:e:&圍yl9ɲ+mςvǭ? O 9p'u/12AR XO^ F mfqdƃUk>.~W\]7|rVX"74+k_'h[$j hTj1^EX2AV3 ~T'ZQ;z[yI@\4 Bܹ4K&ZӾHv7CV=F nP3!3$ƉIh؀]d~$5V1#3ԗ Dj8+T̈}5q{4zP?O]զPK^TNUzלW#w_EI{=tЌ/Y?IM ; Ŗ\.LrRʑ1ve;$,$_Cr22*/&'!slyԨx^-q0_E 6p9# 1L` p@O[ЄhاA=d0=)jpٱ7+dD;֓U~hL-ְ&8#QtRo V,ӏ{&`&܅qpwq吲Z4e nѦ*# chɰtei{\FBiw-|~s}񏩫0S^d#<:ie_LV/ɗHZlI=HcrZtk myUj҄/y+":]7i/!;M]r\=q^ bzΦAiE<з|BuK#orUL};Kۈb0R (;p*o >zL[/r6=+HOA$,O/fCȻġ]%%ZA ݽ;=}_-;uЅs>nkLhO q&!,Up_M48HCj({n/Z)n.O%1&E?QA6˲jK֛9~Jp Ǭm9tS zzQ/K^xcqrA 7 n\t߱JO$s/\qHfZJ={ "Zhj졏Qo޸^=I)zQsgpkNn%OUjI{(P: ^Ȭt;pNӔ[b&;`IN7@'z%,yL:nr]A"_ +cӞpXU(ؚ $e~VlƇZR6$&DpGZu=Y[jqZaߛm/J|A;Iz߆&όߖ򶮝4ڠpʎ僜,\x"7.PDCyd+<_h2'5yڕ߳%ǠZ'9nҀO%}p}f?0/{ yHqY~0d)tdJt3`:k?jBq?$[wxm;(c\Oqv^D vI)o hC| .[sԍ,B0FWMf~d@E3픨ӗ7;cy*h?c-il`͓ ȩ: e?ÁZW[L3[]Ic?uWv),,Gu5(ĩYa0H@2!ܯ5v@^RAJSx{w,+yy5l3Hު(m/ņg5ӭ0ޮ#oT.>B09/Y6scs䮌aFwkIe⦨Al/ I,1?$:ߏU}'j넠no&ݰS q2DU ٟq3*xKOdH1 ްzwvGiя'Fhv-"u0̳&0WAyOڒY<xk5 LHZ?b𗗉:WNȗrS.qﴦ[81dHxT{aSPʠmщEa}s  ]q}5Tsk\Buπu]&Mu`R83یcZݒ8Htųol`u:AE1x>9IhigIF4]Af&dNfxE9, ;/޳^g^:d|_ZP')8`aw7=83/ZB5?TmŐ۝q/ZegjA~y:tNm@\1~xZQ{믋(()%$3b{ux!}K^CG⯥7^, H~\ g ^[]-poBp˽%nUaCo&ҵuȴV 8ƄR i *-LSq מ/weQ}4n JŋALQ!g@|`ݼ sڗb4rK[t x>isA\0h{i9x|"tˤxϡ.-R?+.oĶ,,BEk]>=YR\3t!i0_5#:©iz֨ݿ^`6{gsu)t<܏3KL6]7#ufzn_0oI;ˆ` QrcoQ[xUp$ɏf3n EŖK+#K?S P F88XM3`];sDέ?'{&=VAs6ZvG:n<лq=뺄1{:^&ke$rPYóI놦11oꦐ\@UG~4礼ǂE.'[9Q(xecA (uحvtRUi \jpe qqARGimy]L4# FU`(YVGH6aֿ Y U**iHԂNlS(TF#=n)(p)ڋph q! ʘ؞ Mh!n:SYB] I(0 ֳ1 BEFDz?\x."*eQb*׍Z* nJ4ƪ42{.m>H :]_fMZHD=%&GJV~UwnZ}Hin0 c}y&P_FSl: [?WV谆2vS$ۙ풗 E:돥&TKW)0iR-n^öߏ `rT%Xjgc!*^s YZ