Updated: stunnel 5.06-1 [SECURITY]

Andrew Schulman schulman.andrew@epa.gov
Sat Oct 18 09:03:00 GMT 2014

A new version of stunnel, 5.06-1, is available in the Cygwin distribution.
This is a new upstream release.

This is a security update of stunnel, mainly AFAICT because it now disables
SSLv2 and SSLv3 by default.  Please read the annnouncement at
http://www.stunnel.org/sdf_ChangeLog.html.  Note though that in Cygwin
stunnel doesn't provide a default config file, only a sample
(/etc/stunnel/stunnel.conf-sample) that you can take and adapt for your
use.  So in other words, it's still up to you to disable SSLv2 and SSLv3 in
your services.  If you haven't done that yet, you should, right away.

stunnel has also been rebuilt against OpenSSL 1.0.1j, which now includes
support for TLS_FALLBACK_SCSV. That and disabling SSLv2 and SSLv3 together
address the recently announced POODLE vulnerability in SSL.

stunnel is a program that allows you to encrypt arbitrary TCP connections
inside TLS (Transport Layer Security, formerly known as Secure Sockets
Layer (SSL)).  stunnel can allow you to secure non-TLS-aware daemons and
protocols (like POP, IMAP, LDAP, etc) by having stunnel provide the
encryption, requiring no changes to the daemon's code.

Andrew E. Schulman


To update your installation, click on the "Install Cygwin now" link on
the http://cygwin.com/ web page.  This downloads setup.exe to your
system.  Then, run setup and answer all of the questions.


If you want to unsubscribe from the cygwin-announce mailing list, look
at the "List-Unsubscribe: " tag in the email header of this message.
Send email to the address specified there.  It will be in the format:


If you need more information on unsubscribing, start reading here: 


Please read *all* of the information on unsubscribing that is available
starting at this URL.

More information about the Cygwin-announce mailing list