diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2021-11-01 15:01:50 +0100 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2021-11-01 15:45:39 +0100 |
commit | 691a45c477c4950bfd7c325913a8c30ec9972028 (patch) | |
tree | 6a4d36165afab88d2fab13efa9db12ca32b116b7 /NEWS | |
parent | 373148d8238c9b8e698bfc7c9c38eb66ea95a3e0 (diff) | |
download | fetchmail-691a45c477c4950bfd7c325913a8c30ec9972028.tar.gz fetchmail-691a45c477c4950bfd7c325913a8c30ec9972028.tar.bz2 fetchmail-691a45c477c4950bfd7c325913a8c30ec9972028.zip |
TLS: OpenSSL 1.0.2 workaround Let's Encrypt Expiry
...of cross-signed certificate.
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 11 |
1 files changed, 11 insertions, 0 deletions
@@ -96,6 +96,17 @@ fetchmail-6.4.24 (not yet released): * Bison 3.8 dropped yytoknum altogether, breaking compilation due to a warning workaround. Remove the cast of yytoknum to void. This may cause a compiler warning to reappear with older Bison versions. +* OpenSSL 1.0.2: Workaround for systems that keep the expired DST Root CA X3 + certificate in its trust store because OpenSSL by default prefers the + untrusted certificate and fails. Fetchmail now sets the + X509_V_FLAG_TRUSTED_FIRST flag (on OpenSSL 1.0.2 only). + This is workaround #2 from the OpenSSL Blog. For details, see both: + https://www.openssl.org/blog/blog/2021/09/13/LetsEncryptRootCertExpire/ + https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/ + + NOTE: OpenSSL 1.0.2 is end of life, it is assumed that the OpenSSL library + is kept up to date by a distributor or via OpenSSL support contract. + Where this is not the case, please upgrade to a supported OpenSSL version. # TRANSLATIONS: language translations were updated by these fine people: * sv: Göran Uddeborg [Swedish] |