Skip Menu |

This queue is for tickets about the Event-RPC CPAN distribution.

Report information
The Basics
Id: 83095
Status: resolved
Priority: 0/
Queue: Event-RPC

People
Owner: Nobody in particular
Requestors: moritz [...] bunkus.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: 1.01
Fixed in: (no value)



Subject: IO::Socket::SSL complains about SSL_verify_mode
Current versions of IO::Socket::SSL complain loudly with the following message if Event::RPC::Client is called with ssl set to 1: ******************************************************************* Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client is depreciated! Please set SSL_verify_mode to SSL_VERIFY_PEER together with SSL_ca_file|SSL_ca_path for verification. If you really don't want to verify the certificate and keep the connection open to Man-In-The-Middle attacks please set SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application. ******************************************************************* at /usr/share/perl5/site_perl/Event/RPC/Client.pm line 105. I checked Event::RPC::Client::connect and there's indeed no way to set any of IO::Socket::SSL's options relevant for certificate verification and handling. The caller of Event::RPC::Client should really be able to set those to whatever is appropriate for the application, so please don't just "fix" it by passing SSL_verify_mode=>SSL_VERIFY_NONE.
Thanks for the report. Security issues are always important! I added two options to Event::RPC::Client to handle SSL peer verfication: ssl_ca_file & ssl_ca_path. New version has just been uploaded to CPAN. You can fetch it from here as well: http://www.exit1.org/packages/Event-RPC/dist/Event-RPC-1.03.tar.gz