Hi,
I noticed the latest stunnel x-forwarded-for patch is for stunnel 4.22
released March 28 2008... Would it be very hard to make the patch work for
stunnel 4.27? I don't see anything that major in the new versions but you
never know.
Also is there any rough ETA as to when HAProxy might be able to handle the
SSL's itself? It sounded like HAProxy 1.3.16 laid some ground work to make
future SSL support easier so maybe that will be available before too long?
stunnel Universal SSL tunnel
Version 4.27, 2009.04.16, urgency: MEDIUM:
* New features
- Win32 DLLs for OpenSSL 0.9.8k.
- FIPS support was updated for openssl-fips 1.2.
- New priority failover strategy for multiple "connect" targets,
controlled with "failover=rr" (default) or "failover=prio".
- pgsql protocol negotiation by Marko Kreen <markokr#gmail.com>.
- Building instructions were updated in INSTALL.W32 file.
* Bugfixes
- Libwrap helper processes fixed to close standard
input/output/error file descriptors.
- OS2 compilation fixes.
- WCE fixes by Pierre Delaage <delaage.pierre#free.fr>.
Version 4.26, 2008.09.20, urgency: MEDIUM:
* New features
- Win32 DLLs for OpenSSL 0.9.8i.
- /etc/hosts.allow and /etc/hosts.deny no longer need to be copied to the
chrooted directory, as the libwrap processes are no longer chrooted.
- A more informative error messages for invalid port number specified in
stunnel.conf file.
- Support for Microsoft Visual C++ 9.0 Express Edition.
* Bugfixes
- Killing all libwrap processes at stunnel shutdown fixed.
- A minor bug in stunnel.init sample SysV startup file fixed.
Version 4.25, 2008.06.01, urgency: MEDIUM:
* New features
- Win32 DLLs for OpenSSL 0.9.8h.
* Bugfixes
- Spawning libwrap processes delayed until privileges are dropped.
- Compilation fix for systems without struct msghdr.msg_control.
Version 4.24, 2008.05.19, urgency: HIGH:
* Bugfixes
- OCSP code was fixed to properly reject revocated certificates.
Version 4.23, 2008.05.03, urgency: HIGH:
* Bugfixes
- Local privilege escalation bug on Windows NT based systems fixed. A
local user could exploit stunnel running as a service to gain localsystem
privileges.
Received on 2009/05/04 20:18