Skip Menu |
 

This queue is for tickets about the IO-Socket-SSL CPAN distribution.

Report information
The Basics
Id: 82986
Status: resolved
Priority: 0/
Queue: IO-Socket-SSL

People
Owner: Nobody in particular
Requestors: victor [...] vsespb.ru
Cc:
AdminCc:

Bug Information
Severity: Important
Broken in: (no value)
Fixed in: (no value)



Subject: Warning when used together with LWP::UserAgent
Download (untitled) / with headers
text/plain 680b
I am getting this: ******************************************************************* Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client is depreciated! Please set SSL_verify_mode to SSL_VERIFY_PEER together with SSL_ca_file|SSL_ca_path for verification. If you really don't want to verify the certificate and keep the connection open to Man-In-The-Middle attacks please set SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application. ******************************************************************* Not sure why. I use LWP::UserAgent with $ua->ssl_opts( verify_hostname => 1 ) This only happen when I update IO::Socket::SSL to latest version.
Download (untitled) / with headers
text/plain 915b
Seems this is deploy issue. I fixed it by "cpan -i LWP::Protocol::https". (re-installing LWP::UserAgent or IO::Socket::SSL was not helping) So can be closed. On Sun Jan 27 20:53:49 2013, vsespb wrote: Show quoted text
> I am getting this: > > ******************************************************************* > Using the default of SSL_verify_mode of SSL_VERIFY_NONE for client > is depreciated! Please set SSL_verify_mode to SSL_VERIFY_PEER > together with SSL_ca_file|SSL_ca_path for verification. > If you really don't want to verify the certificate and keep the > connection open to Man-In-The-Middle attacks please set > SSL_verify_mode explicitly to SSL_VERIFY_NONE in your application. > ******************************************************************* > > Not sure why. I use LWP::UserAgent with $ua->ssl_opts( verify_hostname > => 1 ) > > This only happen when I update IO::Socket::SSL to latest version.
closed as requested


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.