Subject: | t/04.cnct-auth-ssl-verifypeer-wrongca.t hangs with IO-Socket-SSL >= 2.0.18 |
When upgrading IO::Socket::SSL from 2.0.16 to 2.0.18 or newer, t/04.cnct-auth-ssl-verifypeer-wrongca.t test hangs:
$ prove -b -v t/04.cnct-auth-ssl-verifypeer-wrongca.t
t/04.cnct-auth-ssl-verifypeer-wrongca.t ..
1..5
ok 1 - use Event::RPC::Client;
ok 2 - ssl connection failed with wrong ca
Can't open SSL connection to localhost:27832: hostname verification failed at t/04.cnct-auth-ssl-verifypeer-wrongca.t line 54.
# Looks like you planned 5 tests but ran 2.
# Looks like your test exited with 255 just after 2.
^C
With older IO::Socket::SSL, the output is:
$ prove -b -v t/04.cnct-auth-ssl-verifypeer-wrongca.t
t/04.cnct-auth-ssl-verifypeer-wrongca.t ..
1..5
ok 1 - use Event::RPC::Client;
ok 2 - ssl connection failed with wrong ca
The verification of cert '/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/C=DE/ST=Irgendwo/L=Koeln/O=exit1.org/OU=Software Development/CN=J\xF6rn Reder/emailAddress=joern@zyn.de'
failed against the host 'localhost' with the default verification scheme.
THIS MIGHT BE A MAN-IN-THE-MIDDLE ATTACK !!!!
To stop this warning you might need to set SSL_verifycn_name to
the name of the host you expect in the certificate.
ok 3 - connect without ssl
ok 4 - client disconnected
ok 5 - server stopped
ok
All tests successful.
Files=1, Tests=5, 0 wallclock secs ( 0.04 usr 0.01 sys + 0.22 cusr 0.07 csys = 0.34 CPU)
Result: PASS
I think something changes in IO::Socket::SSL, so it's not compatible with the Evetn-RPC test suite now. See <http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-2.018/Changes>.
-- Petr