Skip Menu |
 

This queue is for tickets about the IO-Socket-SSL CPAN distribution.

Report information
The Basics
Id: 76053
Status: resolved
Priority: 0/
Queue: IO-Socket-SSL

People
Owner: Nobody in particular
Requestors: UNDEF [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: 140D9115:SSL routines:SSL_GET_PREV_SESSION:session id context uninitialized
Download (untitled) / with headers
text/plain 474b
Good day. I am receiving next error on second connection of Firefox to a http server based on IO::Socket::SSL with enabled client authorization: SSL accept attempt failed with unknown error error:140D9115:SSL routines:SSL_GET_PREV_SESSION:session id context uninitialized SSL context is reused between connections, but session cache is disabled. I've found similar report on nginx forum http://forum.nginx.org/read.php?2,52263 Could you please suggest how to fix it?
Download (untitled) / with headers
text/plain 251b
thanks for reporting the problem. While it is probably possible to hack around it using SSL_create_ctx_callback and Net::SSLeay::CTX_set_session_id_context it wouldn't be nice. So starting with 1.61 it should just work w/o fiddling. Regards, Steffen
Download (untitled) / with headers
text/plain 178b
Thanks for quick fixup. Works like a charm! But I found a small problem: context id is not generated if ssl server uses optional client verification. Patch with fixup attached.
Subject: ssl-context-id.path
Download ssl-context-id.path
application/octet-stream 460b

Message body not shown because it is not plain text.

From: chip [...] pobox.com
Download (untitled) / with headers
text/plain 191b
1.61 fails self-test. It claims accept failure in dhs.t, but actually strace shows that accept did not fail. Let me know if I can contribute, or if this thread's patch already fixes this.
Download (untitled) / with headers
text/plain 624b
Am Di 27. Mär 2012, 20:15:05, CHIPS schrieb: Show quoted text
> 1.61 fails self-test. It claims accept failure in dhs.t, but actually > strace shows that accept did not fail. Let me know if I can contribute, > or if this thread's patch already fixes this.
Hi, this is a different issue, which was also in 1.60. It looks like that the fixes on this test for OpenSSL1.01 made the test fail for at least one setup. Please open a new bug for this issue and add details about the version of Net::SSLeay and OpenSSL you are using: perl -MIO::Socket::SSL -e 'printf "%f, %x\n", $Net::SSLeay::VERSION, Net::SSLeay::OPENSSL_VERSION_NUMBER()'
Download (untitled) / with headers
text/plain 262b
Am Di 27. Mär 2012, 18:24:19, UNDEF schrieb: Show quoted text
> Thanks for quick fixup. Works like a charm! > > But I found a small problem: context id is not generated if ssl server > uses optional client verification. > > Patch with fixup attached.
Thanks, fixed for 1.62


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.