Some SIGCHLD handler problem in Stunnel.. from the announce-list ---------- Forwarded message ---------- Date: Sun, 12 Jan 2003 16:57:02 +0100 From: Michal Trojnara <Michal.Trojnara@mirt.net> To: openssl-users@openssl.org, stunnel-announce@mirt.net, stunnel-users@mirt.net Subject: Stunnel 4.04 released -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Version 4.04, 2003.01.12, urgency: MEDIUM: * New feature sponsored by SURFnet http://www.surfnet.nl/ - Encrypted private key can be used with Win32 GUI. * New features - New 'options' configuration option to setup OpenSSL library hacks with SSL_CTX_set_options(). - 'service' option also changes the name for TCP Wrappers access control in inetd mode. - Support for BeOS (thx to Mike I. Kozin <mik@sbor.net>) - SSL is negotiated before connecting remote host or spawning local process whenever possible. - REMOTE_HOST variable is always placed in the enrivonment of a process spawned with 'exec'. - Whole SSL error stack is dumped on errors. - 'make cert' rule is back (was missing since 4.00). - Manual page updated (special thanks to Brian Hatch). - TODO updated. * Bugfixes - Major code cleanup (thx to Steve Grubb <linux_4ever@yahoo.com>). - Unsafe functions are removed from SIGCHLD handler. - Several bugs in auth_user() fixed. - Incorrect port when using 'local' option fixed. - OpenSSL tools '-rand' option is no longer directly used with a device (like '/dev/urandom'). Temporary random file is created with 'dd' instead. * DLLs for OpenSSL 0.9.7. The problem with unsafe SIGCHLD handler is a serious one, so I recommend the upgrade. Homepage: http://stunnel.mirt.net/ Download: ftp://stunnel.mirt.net/stunnel/ Best regards, Mike -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+IZBO/NU+nXTHMtERAki4AJ9orDnEQ/QAGLJLwUA/384LQINP0ACdHwZH gAcF2V4G00rBWtwLf+uMolg= =1mlP -----END PGP SIGNATURE-----