Skip Menu |

This queue is for tickets about the IO-Socket-SSL CPAN distribution.

Report information
The Basics
Id: 127773
Status: resolved
Priority: 0/
Queue: IO-Socket-SSL

Owner: Nobody in particular
Requestors: KES [...]

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: 2.064

Subject: Add support for openssl fingerprint
Download (untitled) / with headers
text/plain 742b
Hi. In situations when you have access only to HOST:PORT and want to pine this certificate this is impossible to call ->get_fingerprint, because it works on: of an established connection and if host have self-signed certificate the connection is not established: SSL connect attempt failed error:14090086:SSL See details [here]( When hoster gives me his pubkey I get its fingerprint with openssl: openssl x509 -noout -fingerprint -sha256 -inform pem -in SHA256 Fingerprint=E0:3F:F1:4E:06:18:F7:93:34:6F:91:77:7F:C0:9E:3A:CF:93:F5:BC:12:71:38:30:AC:87:5E:21:7E:CB:7A:58 But this has different format and not suitable for IO::Socket::SSL module =(
Download (untitled) / with headers
text/plain 248b
This is fixed in 2.064. One can now just cut+paste the fingerprint from the openssl output (i.e. hex and colons) and it will ignore the colons (did already before) and figure out the hash algorithms based on the length of the string (new in 2.064).

This service is sponsored and maintained by Best Practical Solutions and runs on infrastructure.

Please report any issues with to