84 Commits

Author SHA256 Message Date
e684eccda4 Accepting request 989975 from home:pmonrealgonzalez:branches:security:Stunnel
- Update to 5.65:
  * Security bugfixes
    - OpenSSL DLLs updated to version 3.0.5.
  * Bugfixes
    - Fixed handling globally enabled FIPS.
    - Fixed openssl.cnf processing in WIN32 GUI.
    - Fixed a number of compiler warnings.
    - Fixed tests on older versions of OpenSSL.

OBS-URL: https://build.opensuse.org/request/show/989975
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=152
2022-07-18 14:55:21 +00:00
e2f3f37f34 Accepting request 975537 from home:dirkmueller:Factory
- update to 5.64:
  * Security bugfixes
    - OpenSSL DLLs updated to version 3.0.3.
  * New features
    - Updated the pkcs11 engine for Windows.
  * Bugfixes
    - Removed the SERVICE_INTERACTIVE_PROCESS flag in
      "stunnel -install".

OBS-URL: https://build.opensuse.org/request/show/975537
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=149
2022-05-09 07:32:17 +00:00
e24e820cc6 Accepting request 963345 from home:dirkmueller:Factory
- update to 5.63:
  * Security bugfixes
    - OpenSSL DLLs updated to version 3.0.2.
  * New features
    - Updated stunnel.spec to support bash completion
  * Bugfixes
    - Fixed possible PRNG initialization crash (thx to Gleydson Soares).

OBS-URL: https://build.opensuse.org/request/show/963345
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=147
2022-03-23 12:57:43 +00:00
77877cdc95 Accepting request 957109 from home:pmonrealgonzalez:branches:security:Stunnel
- Update to 5.62:
  * New features
    - Added a bash completion script.
  * Bugfixes
    - Fixed a transfer() loop bug.
- Update to 5.61:
  * New features
    - Added new "protocol = capwin" and "protocol = capwinctrl"
      configuration file options.
    - Rewritten the testing framework in python.
    - Added support for missing SSL_set_options() values.
    - Updated stunnel.spec to support RHEL8.
  * Bugfixes
    - Fixed OpenSSL 3.0 build.
    - Fixed reloading configuration with "systemctl reload stunnel.service".
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed printing IPv6 socket option defaults on FreeBSD.
- Rebase harden_stunnel.service.patch
- Remove FIPS-related regression tests
- Remove obsolete version checks

OBS-URL: https://build.opensuse.org/request/show/957109
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=146
2022-02-23 15:15:52 +00:00
c9cc2b83f1 Accepting request 933485 from home:jsegitz:branches:systemdhardening:security:Stunnel
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/933485
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=145
2021-12-16 10:19:47 +00:00
0e1f4f9ea1 Accepting request 912662 from home:asvetter:branches:security:Stunnel
- Update to 5.60:
  * New features
    - New 'sessionResume' service-level option to allow
      or disallow session resumption
    - Added support for the new SSL_set_options() values.
    - Download fresh ca-certs.pem for each new release.
  * Bugfixes
    - Fixed 'redirect' with 'protocol'.  This combination is
      not supported by 'smtp', 'pop3' and 'imap' protocols.

OBS-URL: https://build.opensuse.org/request/show/912662
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=144
2021-08-18 08:28:04 +00:00
536b741d30 Accepting request 885049 from home:dstoecker:branches:security:Stunnel
Submitted to author by e-mail.

P.S. The change in the comment line removes a rpm warning.

OBS-URL: https://build.opensuse.org/request/show/885049
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=142
2021-04-21 15:02:39 +00:00
3cad4a3038 OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=139 2021-04-13 13:22:02 +00:00
d632faa071 OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=130 2021-04-12 14:36:23 +00:00
8ada5fe46b Accepting request 883808 from home:asvetter:branches:home:AndreasStieger:branches:security:Stunnel
- Disable testsuite for everything except Tumbleweed since it does not work on Leap/SLE
- update to 5.59:
  * new feature: Client-side "protocol = ldap" support
  * Fix configuration reload when compression is used
  * Fix paths in generated manuals
  * Fix test suite fixed not to require external connectivity
- run testsuite during package build

OBS-URL: https://build.opensuse.org/request/show/883808
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=129
2021-04-08 09:58:42 +00:00
e03236a509 Accepting request 874103 from home:asvetter:branches:security:Stunnel
- Update to 5.58:
  *  Security bugfixes
     -  The "redirect" option was fixed to properly handle unauthenticated requests (thx to Martin Stein).

And more bugfixes and new features.

OBS-URL: https://build.opensuse.org/request/show/874103
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=126
2021-02-21 07:21:31 +00:00
c6b2dad9e6 Accepting request 866858 from home:dstoecker:branches:security:Stunnel
- Do not replace the active config file

This setting silently killed my server instance. %config without noreplace should not be used for files which are modified by uses (which files in /etc are).

OBS-URL: https://build.opensuse.org/request/show/866858
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=122
2021-01-26 15:29:15 +00:00
347e382da0 Accepting request 851865 from home:asvetter:branches:security:Stunnel
- Remove pidfile from service file fixes start bug: boo#1178533

OBS-URL: https://build.opensuse.org/request/show/851865
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=120
2020-12-11 19:52:27 +00:00
ba3519d3b2 Accepting request 841077 from home:stroeder:branches:security:Stunnel
update to 5.57 with security bugfixes

OBS-URL: https://build.opensuse.org/request/show/841077
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=116
2020-10-12 07:54:48 +00:00
c18fafa42f Accepting request 829030 from home:dirkmueller:branches:security:Stunnel
- update to 5.56:
  - Various text files converted to Markdown format.
  - Support for realpath(3) implementations incompatible
    with POSIX.1-2008, such as 4.4BSD or Solaris.
  - Support for engines without PRNG seeding methods (thx to
    Petr Mikhalitsyn).
  - Retry unsuccessful port binding on configuration
    file reload.
  - Thread safety fixes in SSL_SESSION object handling.
  - Terminate clients on exit in the FORK threading model.

OBS-URL: https://build.opensuse.org/request/show/829030
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=114
2020-08-26 13:54:12 +00:00
638591f267 Accepting request 783181 from home:asvetter:branches:security:Stunnel
- Fixup stunnel.conf handling:
  * Remove old static openSUSE provided stunnel.conf.
  * Use upstream stunnel.conf and tailor it for openSUSE using sed.
  * Don't show README.openSUSE when installing.
- enable /etc/stunnel/conf.d
- re-enable openssl.cnf

OBS-URL: https://build.opensuse.org/request/show/783181
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=111
2020-03-11 14:05:16 +00:00
7c3c7b36d8 Accepting request 769723 from home:dimstar:Factory
Shortcut through -mini

OBS-URL: https://build.opensuse.org/request/show/769723
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=109
2020-02-03 17:35:56 +00:00
30829f2f0f Accepting request 730771 from home:vitezslav_cizek:branches:security:Stunnel
- Install the correct file as README.openSUSE (bsc#1150730)
  * stunnel.keyring was accidentally installed instead

- update to version 5.55
  New features
    New "ticketKeySecret" and "ticketMacSecret" options to control confidentiality
      and integrity protection of the issued session tickets. These options allow for
      session resumption on other nodes in a cluster.
    Logging of the assigned bind address instead of the requested bind address.
    Check whether "output" is not a relative file name.
    Added sslVersion, sslVersionMin and sslVersionMax for OpenSSL 1.1.0 and later.
    Hexadecimal PSK keys are automatically converted to binary.
    Session ticket support (requires OpenSSL 1.1.1 or later). "connect" address
      persistence is currently unsupported with session tickets.
    SMTP HELO before authentication (thx to Jacopo Giudici).
    New "curves" option to control the list of elliptic curves in OpenSSL 1.1.0 and later.
    New "ciphersuites" option to control the list of permitted TLS 1.3 ciphersuites.
    Include file name and line number in OpenSSL errors.
    Compatibility with the current OpenSSL 3.0.0-dev branch.
    Better performance with SSL_set_read_ahead()/SSL_pending().
  Bugfixes
    A number of testing framework fixes and improvements.
    Service threads are terminated before OpenSSL cleanup to prevent occasional stunnel crashes at shutdown.
    Fixed data transfer stalls introduced in stunnel 5.51.
    Fixed a transfer() loop bug introduced in stunnel 5.51.
    Fixed PSKsecrets as a global option (thx to Teodor Robas).
    Fixed a memory allocation bug (thx to matanfih).
    Fixed PSK session resumption with TLS 1.3.
    Fixed a memory leak in the WIN32 logging subsystem.
    Allow for zero value (ignored) TLS options.

OBS-URL: https://build.opensuse.org/request/show/730771
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=107
2019-09-16 11:49:39 +00:00
15e411d7b6 Accepting request 678172 from home:fbui:branches:security:Stunnel
- Drop use of $FIRST_ARG in .spec
  The use of $FIRST_ARG was probably required because of the
  %service_* rpm macros were playing tricks with the shell positional
  parameters. This is bad practice and error prones so let's assume
  that no macros should do that anymore and hence it's safe to assume
  that positional parameters remains unchanged after any rpm macro
  call.

OBS-URL: https://build.opensuse.org/request/show/678172
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=105
2019-02-22 09:52:05 +00:00
fe5b45c9f3 Accepting request 648213 from home:jsjhb:branches:security:Stunnel
update to 5.49, w/ rebased listenqueue patch. I had to disable checks in .spec, because the tests depend on ncat and network ressources.

OBS-URL: https://build.opensuse.org/request/show/648213
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=103
2018-11-11 16:56:24 +00:00
cdf38be57a Accepting request 573322 from home:asvetter:branches:security:Stunnel
- Revamp SLE11 builds

OBS-URL: https://build.opensuse.org/request/show/573322
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=101
2018-02-07 09:38:42 +00:00
a869942b32 Accepting request 573238 from home:jengelh:branches:security:Stunnel
- Do not ignore errors from useradd. Ensure nogroup exists
  beforehand.
- Replace old $RPM_ variables. Combine two nested ifs.

OBS-URL: https://build.opensuse.org/request/show/573238
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=99
2018-02-06 09:19:14 +00:00
a81d572e7c Accepting request 569418 from home:avindra
This time with the SLE11 line back in action

OBS-URL: https://build.opensuse.org/request/show/569418
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=97
2018-02-01 09:12:11 +00:00
513073a1bd Accepting request 544840 from home:RBrownSUSE:branches:security:Stunnel
Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)

OBS-URL: https://build.opensuse.org/request/show/544840
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=95
2017-12-02 21:58:07 +00:00
ca9688d10b Accepting request 513619 from home:stroeder:branches:security:Stunnel
update to 5.42

OBS-URL: https://build.opensuse.org/request/show/513619
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=92
2017-08-01 06:15:55 +00:00
Dr. Werner Fink
bfa4fc4b0c .
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=90
2017-04-06 09:08:27 +00:00
dcc16eff5a Accepting request 484358 from home:stroeder:branches:security:Stunnel
update to 5.41

OBS-URL: https://build.opensuse.org/request/show/484358
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=88
2017-04-03 06:54:44 +00:00
812af2d590 Accepting request 456145 from home:kukuk:branches:security:Stunnel
- Don't require insserv if we don't use it

OBS-URL: https://build.opensuse.org/request/show/456145
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=86
2017-02-10 22:14:21 +00:00
862cd0f3bb Accepting request 453146 from home:stroeder:branches:security:Stunnel
update to 5.40

OBS-URL: https://build.opensuse.org/request/show/453146
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=84
2017-01-29 07:54:00 +00:00
f9c230a05d Accepting request 448522 from home:stroeder:branches:security:Stunnel
update to 5.39

OBS-URL: https://build.opensuse.org/request/show/448522
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=82
2017-01-02 15:42:49 +00:00
Daniel Rahn
38bf4c363a Accepting request 444868 from home:stroeder:branches:security:Stunnel
update to 5.38

OBS-URL: https://build.opensuse.org/request/show/444868
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=80
2016-12-08 13:12:27 +00:00
1e9c40a256 Accepting request 435652 from home:jengelh:branches:security:Stunnel
- Update rpm group and description and make -doc noarch
- Do not suppress errors from useradd
- Remove redundant %clean section

OBS-URL: https://build.opensuse.org/request/show/435652
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=78
2016-10-25 08:47:46 +00:00
Daniel Rahn
b7c07bdf0a - update to version 5.36
- Removed direct zlib dependency.

OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=77
2016-10-14 08:06:04 +00:00
Daniel Rahn
82d23f55cc Accepting request 429283 from home:sdrahn:branches:security:Stunnel
- update to version 5.35
- repackage source as bz2
- adjust systemd unit file to start after network-online.target
- bugixes:
	* Fixed incorrectly enforced client certificate requests. 
	* Fixed thread safety of the configuration file reopening.
	* Fixed malfunctioning "verify = 4".
	* Only reset the watchdog if some data was actually transferred. 
	* Fixed logging an incorrect value of the round-robin starting point (thx to
	  Jose Alf.).
- new features:
	* Added three new service-level options: requireCert, verifyChain, and
	  verifyPeer for fine-grained certificate verification control. 
	* SNI support also enabled on OpenSSL 0.9.8f and later (thx to Guillermo
	  Rodriguez Garcia).
	* Added support for PKCS #12 (.p12/.pfx) certificates (thx to Dmitry
	  Bakshaev).
	* New "socket = a:IPV6_V6ONLY=yes" option to only bind IPv6. 
	* Added logging the list of client CAs requested by the server.

OBS-URL: https://build.opensuse.org/request/show/429283
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=76
2016-09-21 11:09:42 +00:00
4fff1f9924 Accepting request 357515 from home:stroeder:branches:security:Stunnel
update to 5.30

OBS-URL: https://build.opensuse.org/request/show/357515
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=75
2016-02-03 12:43:26 +00:00
fd5e6cd131 Accepting request 355231 from home:dstoecker
Fix was extremely easy, so I did it.

OBS-URL: https://build.opensuse.org/request/show/355231
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=74
2016-01-21 20:09:15 +00:00
Daniel Rahn
2b40af0db6 - stunnel-ocsp-host.patch: Fix compatibility issues with older OpenSSL
versions. Replaces stunnel-5.22-code11-openssl-compat.diff.

OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=73
2015-08-06 08:19:37 +00:00
Daniel Rahn
314067655a Accepting request 319695 from home:sdrahn:branches:security:Stunnel
- update to version 5.22
  New features
	- "OCSPaia = yes" added to the configuration file templates.
	- Improved double free detection.
  Bugfixes
	- Fixed a number of OCSP bugs. The most severe of those bugs caused stunnel to
	  treat OCSP responses that failed OCSP_basic_verify() checks as if they were
	  successful.
	- Fixed the passive IPv6 resolver (broken in stunnel 5.21).
- Remove executable bit from sample scripts
- stunnel-5.22-code11-openssl-compat.diff: Compatibility for openssl on CODE11

OBS-URL: https://build.opensuse.org/request/show/319695
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=72
2015-07-31 06:20:54 +00:00
Daniel Rahn
c10a79e5db Accepting request 319059 from home:sdrahn:branches:security:Stunnel
- update to version 5.21
  
  New features
	- Signal names are displayed instead of numbers.
	- First resolve IPv4 addresses on passive resolver requests.
	- More elaborate descriptions were added to the warning about using
	  "verify = 2" without "checkHost" or "checkIP".
	- Performance optimization was performed on the debug code.
  Bugfixes
	    
	- Fixed the FORK and UCONTEXT threading support.
	- Fixed "failover=prio" (broken since stunnel 5.15).
	- Added a retry when sleep(3) was interrupted by a signal in the cron
	  thread scheduler.

OBS-URL: https://build.opensuse.org/request/show/319059
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=71
2015-07-28 06:10:08 +00:00
Daniel Rahn
4ee052d067 Accepting request 316545 from home:sdrahn:branches:security:Stunnel
- update to version 5.20
  New features
    - The SSL library detection algorithm was made a bit smarter.
    - Warnings about insecure authentication were modified to include the name of
      the affected service section.
    - Documentation updates (closes Debian bug #781669).
  Bugfixes
    - Signal pipe reinitialization added to prevent turning the main accepting
      thread into a busy wait loop when an external condition breaks the signal pipe.
      This bug was found to surface on Win32, but other platforms may also be
      affected.
    - Generated temporary DH parameters are used for configuration reload instead
      of the static defaults.
    - Fixed the manual page headers (thx to Gleydson Soares).

OBS-URL: https://build.opensuse.org/request/show/316545
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=70
2015-07-14 06:17:33 +00:00
Daniel Rahn
d17aa7ebbc Accepting request 314344 from home:sdrahn:branches:security:Stunnel
- update to version 5.19
  Bugfixes:
  - Improved socket error handling. 
  - Fixed handling of dynamic connect targets. 
  - Fixed handling of trailing whitespaces in the Content-Length header of the
    NTLM authentication. 
  - Fixed memory leaks in certificate verification.
  New features:
  - The "redirect" option was improved to not only redirect sessions established
    with an untrusted certificate, but also sessions established without a
    client certificate. 
  - Randomize the initial value of the round-robin counter. 
  - Added "include" configuration file option to include all configuration file
    parts located in a specified directory. 
  - Temporary DH parameters are refreshed every 24 hours, unless static DH
    parameters were provided in the certificate file. 
  - Warnings are logged on potentially insecure authentication. 
- stunnel-listenqueue-option.patch: Refresh.
- stunnel3-binpath.patch: Obsolete, dropped.
- stunnel.service: Modified to start after network.target, not syslog.target.

OBS-URL: https://build.opensuse.org/request/show/314344
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=69
2015-06-29 10:02:42 +00:00
5162151582 Accepting request 281295 from home:stroeder:branches:security:Stunnel
Update to 5.09

OBS-URL: https://build.opensuse.org/request/show/281295
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=68
2015-01-16 10:49:39 +00:00
d6b64f849d Accepting request 250045 from home:asvetter:branches:security:Stunnel
Add following to changes
Cleanup of spec file.
Build for SLE11-SP3 with --disable-fips
Build for SLE11-Security-Module (with enabled fips)

OBS-URL: https://build.opensuse.org/request/show/250045
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=67
2014-09-18 09:28:24 +00:00
63e520cd75 Accepting request 230920 from home:stroeder:branches:security:Stunnel
Update to upstream version 5.01.

OBS-URL: https://build.opensuse.org/request/show/230920
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=66
2014-04-29 07:57:02 +00:00
Daniel Rahn
00d27283e5 - update to final v5.00 code
- security fix: Added PRNG state update in fork threading (CVE-2014-0016).
- Patches:
  - stunnel-listenqueue-option.patch refreshed.

OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=65
2014-03-06 16:20:19 +00:00
Daniel Rahn
61d997db96 - re-add openssl cert conf file stunnel.cnf dropped by oversight.
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=64
2014-02-05 12:14:29 +00:00
Daniel Rahn
ae3d16944a Readd missing patch.
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=63
2014-01-29 17:06:17 +00:00
Daniel Rahn
5fada29b31 - - Update to version 5.0b1 (FATE#315694)
- Default "pid" is now "", i.e. not to create a pid file at startup.
  - Default "ciphers" updated to "HIGH:MEDIUM:+3DES:+DH:!aNULL:!SSLv2" due to
    AlFBPPS attack and bad performance of DH ciphersuites. 
  - New service-level option "redirect" to redirect SSL client connections on
    authentication failures instead of rejecting them.
  - New global "engineDefault" configuration file option to control which
    OpenSSL tasks are delegated to the current engine.
  - New service-level configuration file option "engineId" to select the engine
    by identifier, e.g. "engineId = capi". 
  - Improved readability of error messages printed when stunnel refuses to start
    due to a critical error.
- Patches:
  - stunnel-CVE-2013-1762.patch obsoleted. Drpped.
  - stunnel-default-fips-off.patch obsoleted. Dropped.
  - stunnel-listenqueue-option.patch refreshed.
- update to version 4.56

OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=62
2014-01-29 16:56:32 +00:00
4c843518d3 Accepting request 205550 from home:stroeder:branches:security:Stunnel
Update to 4.56

OBS-URL: https://build.opensuse.org/request/show/205550
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=61
2013-11-01 16:16:55 +00:00
Daniel Rahn
be2c0bb17f - Fix background operation to really go into background
OBS-URL: https://build.opensuse.org/package/show/security:Stunnel/stunnel?expand=0&rev=59
2012-07-23 09:17:43 +00:00