Control: tag -1 + confirmed upstream patch
Control: forwarded -1 https://github.com/libwww-perl/LWP-Protocol-https/pull/77

On Sat, 03 Feb 2024 08:40:41 +0100, Christian Marillat wrote:

> This bug should be fixed. If Ipv6 isn't available, Ipv4 should be used.
> Before 6.12 this package was working perfectly.
> Th best is to forward this bug to upstream author.

Right. And before doing this I wanted to understand what's actually
going on, and finally I could reproduce it. You gave me the keyword
earlier: The problem is in the SNI part of the change, and appears
when a _proxy_ is used. So after installing squid in the local
network I get:

% https_proxy=http://new:3128 HEAD 
https://metacpan.org/release/LWP-Protocol-https
500 SSL upgrade failed: hostname verification failed
Content-Type: text/plain
Client-Date: Sun, 04 Feb 2024 15:50:11 GMT
Client-Warning: Internal response

(And the $host variable in line 85 is undef.)

% env -u https_proxy HEAD https://metacpan.org/release/LWP-Protocol-https
200 OK
Cache-Control: max-age=3600
Connection: close
Date: Sun, 04 Feb 2024 15:50:37 GMT
Via: 1.1 varnish, 1.1 varnish
Accept-Ranges: bytes
Age: 0
Server: nginx
Vary: Accept-Encoding
Content-Length: 49785
Content-Type: text/html; charset=utf-8
Last-Modified: Mon, 22 Jan 2024 17:51:48 GMT
Client-Date: Sun, 04 Feb 2024 15:50:37 GMT
Client-Peer: 151.101.194.217:443
Client-Response-Num: 1
Client-SSL-Cert-Issuer: /C=BE/O=GlobalSign nv-sa/CN=GlobalSign Atlas R3 DV TLS 
CA 2023 Q2
Client-SSL-Cert-Subject: /CN=metacpan.org
Client-SSL-Cipher: ECDHE-RSA-CHACHA20-POLY1305
Client-SSL-Socket-Class: IO::Socket::SSL
Client-SSL-Version: TLSv1_2
Content-Security-Policy: default-src * data: 'unsafe-inline'; frame-ancestors 
'self' *.metacpan.org; script-src 'self' 'unsafe-eval' 'unsafe-inline' 
*.metacpan.org *.google-analytics.com *.google.com www.gstatic.com
Strict-Transport-Security: max-age=31557600
X-Cache: MISS, MISS
X-Cache-Hits: 0, 0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Runtime: 3.174736
X-Served-By: cache-lhr7344-LHR, cache-vie6362-VIE
X-Timer: S1707061835.628790,VS0,VE3218
X-XSS-Protection: 1; mode=block


And before I could file the bug upstream, I noticed that there is
already a new pull request for this issue:
https://github.com/libwww-perl/LWP-Protocol-https/pull/77

And at least for me, the little change from
https://patch-diff.githubusercontent.com/raw/libwww-perl/LWP-Protocol-https/pull/77.diff
works:

% https_proxy=http://new:3128 HEAD 
https://metacpan.org/release/LWP-Protocol-https
200 OK
Cache-Control: max-age=3600
Connection: close
Date: Sun, 04 Feb 2024 15:54:18 GMT
Via: 1.1 varnish, 1.1 varnish
Accept-Ranges: bytes
Age: 221
Server: nginx
Vary: Accept-Encoding
Content-Length: 49785
Content-Type: text/html; charset=utf-8
Last-Modified: Mon, 22 Jan 2024 17:51:48 GMT
Client-Date: Sun, 04 Feb 2024 15:54:18 GMT
Client-Peer: 192.168.0.247:3128
Client-Response-Num: 1
Content-Security-Policy: default-src * data: 'unsafe-inline'; frame-ancestors 
'self' *.metacpan.org; script-src 'self' 'unsafe-eval' 'unsafe-inline' 
*.metacpan.org *.google-analytics.com *.google.com www.gstatic.com
Strict-Transport-Security: max-age=31557600
X-Cache: MISS, HIT
X-Cache-Hits: 0, 1
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Runtime: 3.174736
X-Served-By: cache-lhr7344-LHR, cache-vie6320-VIE
X-Timer: S1707062059.838034,VS0,VE2
X-XSS-Protection: 1; mode=block


I'm preparing an upload with this new fix.


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   

Attachment: signature.asc
Description: Digital Signature

Reply via email to