Hab was entdeckt. Und zwar hatte ich Perl 5.18 nochmal neu installiert. Jetzt habe ich angefangen, alle nötigen Module zu installieren und dabei ist mir aufgefallen, dass
IO::Socket::SSL es kaputt macht. Sobald das drauf ist funktionieren keine SSL Verbindungen mehr. Aber wie kann das sein? Laut Log überschreibt es doch nichts, was schon da ist.
Und sobald ich im Module Verzeichnis das Verz. "IO" umbenenne in "kein_IO" klappt HTTPS wieder. Das kann ich beliebig oft wiederholen, es folgt immer dieser Regel.
Wie kann das sein, dass ein Modul scheinbar garnicht benötigt wird, wenn es da ist aber trotzdem verwendet wird?
Quotecpan> install IO::Socket::SSL
Database was generated on Tue, 24 Mar 2015 08:07:12 GMT
Running install for module 'IO::Socket::SSL'
Checksum for C:\strawberry\cpan\sources\authors\id\S\SU\SULLR\IO-Socket-SSL-2.012.tar.gz ok
Scanning cache C:\strawberry\cpan\build for sizes
............................................................................DONE
Configuring S/SU/SULLR/IO-Socket-SSL-2.012.tar.gz with Makefile.PL
Should I do external tests?
These test will detect if there are network problems and fail soft,
so please disable them only if you definitely don't want to have any
network traffic to external sites. [Y/n] [y]
Checking if your kit is complete...
Looks good
Generating a dmake-style Makefile
Writing Makefile for IO::Socket::SSL
Writing MYMETA.yml and MYMETA.json
SULLR/IO-Socket-SSL-2.012.tar.gz
C:\strawberry\perl\bin\perl.exe Makefile.PL -- OK
Running make for S/SU/SULLR/IO-Socket-SSL-2.012.tar.gz
cp lib/IO/Socket/SSL/Intercept.pm blib\lib\IO\Socket\SSL\Intercept.pm
cp lib/IO/Socket/SSL/Utils.pm blib\lib\IO\Socket\SSL\Utils.pm
cp lib/IO/Socket/SSL.pod blib\lib\IO\Socket\SSL.pod
cp lib/IO/Socket/SSL.pm blib\lib\IO\Socket\SSL.pm
cp lib/IO/Socket/SSL/PublicSuffix.pm blib\lib\IO\Socket\SSL\PublicSuffix.pm
SULLR/IO-Socket-SSL-2.012.tar.gz
C:\strawberry\c\bin\dmake.exe -- OK
Running make test
C:\strawberry\perl\bin\perl.exe "-MExtUtils::Command::MM" "-MTest::Harness" "-e" "undef *Test::Harness::Switches; test_harne
ss(0, 'blib\lib', 'blib\arch')" t/*.t t/external/*.t
t/01loadmodule.t .................. # openssl version=0x1000107f
# Net::SSLeay::VERSION=1.66
t/01loadmodule.t .................. ok
t/acceptSSL-timeout.t ............. ok
t/alpn.t .......................... skipped: ALPN not available in Net::SSLeay
t/auto_verify_hostname.t .......... ok
t/cert_formats.t .................. ok
t/cert_no_file.t .................. ok
t/compatibility.t ................. ok
t/connectSSL-timeout.t ............ ok
t/core.t .......................... ok
t/dhe.t ........................... ok
t/ecdhe.t ......................... ok
t/external/ocsp.t ................. # tcp connect to www.live.com:443 ok
# fingerprint matches
# validation with default CA w/o OCSP ok
# got stapled response as expected
# validation with default CA with OCSP defaults ok
# validation with default CA with OCSP full chain ok
t/external/ocsp.t ................. 1/3 # tcp connect to www.google.com:443 ok
# tcp connect to revoked.grc.com:443 ok
# fingerprint matches
# validation with default CA w/o OCSP ok
t/external/ocsp.t ................. ok
t/external/usable_ca.t ............ # found 154 CA certs
# have root CA for www.google.com in store
# 5 connections to www.google.com ok
t/external/usable_ca.t ............ 1/21 # have root CA for www.yahoo.com in store
# 5 connections to www.yahoo.com ok
# fingerprint www.yahoo.com matches
# check www.yahoo.com against builtin CA store ok
t/external/usable_ca.t ............ 4/21 # have root CA for www.comdirect.de in store
# 5 connections to www.comdirect.de ok
# fingerprint www.comdirect.de matches
# check www.comdirect.de against builtin CA store ok
t/external/usable_ca.t ............ 7/21 # have root CA for meine.deutsche-bank.de in store
# 5 connections to meine.deutsche-bank.de ok
# fingerprint meine.deutsche-bank.de matches
# check meine.deutsche-bank.de against builtin CA store ok
t/external/usable_ca.t ............ 12/21 # have root CA for www.twitter.com in store
# 5 connections to www.twitter.com ok
# have root CA for www.facebook.com in store
# 5 connections to www.facebook.com ok
# have root CA for www.live.com in store
# 5 connections to www.live.com ok
# fingerprint www.live.com matches
# check www.live.com against builtin CA store ok
t/external/usable_ca.t ............ ok
t/io-socket-inet6.t ............... ok
t/io-socket-ip.t .................. ok
t/memleak_bad_handshake.t ......... skipped: ps not implemented on this platform
t/mitm.t .......................... ok
t/nonblock.t ...................... ok
t/npn.t ........................... ok
t/plain_upgrade_downgrade.t ....... # -- test: newINET start_SSL stop_SSL start_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
t/plain_upgrade_downgrade.t ....... 1/15 # server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x160301 from client
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 connect_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# -- test: newSSL:0 start_SSL stop_SSL connect_SSL
# server accepted new client
# wait for initial data from client
# got 0x666f6f from client
# server: got plain data at start of connection
# server: TLS upgrade
# server: TLS downgrade
# server: TLS upgrade#2
# server accepted new client
# wait for initial data from client
# got 0x656e64 from client
# client requested end of tests
t/plain_upgrade_downgrade.t ....... ok
t/protocol_version.t .............. ok
t/public_suffix_lib_encode_idn.t .. ok
t/public_suffix_lib_libidn.t ...... ok
t/public_suffix_lib_uri.t ......... ok
t/public_suffix_ssl.t ............. ok
t/readline.t ...................... ok
t/sessions.t ...................... ok
t/signal-readline.t ............... skipped: signals not relevant on this platform
t/sni.t ........................... ok
t/sni_verify.t .................... ok
t/start-stopssl.t ................. ok
t/startssl-failed.t ............... ok
t/startssl.t ...................... ok
t/sysread_write.t ................. ok
t/verify_fingerprint.t ............ ok
t/verify_hostname.t ............... ok
t/verify_hostname_standalone.t .... ok
All tests successful.
Files=37, Tests=765, 129 wallclock secs ( 0.28 usr + 0.05 sys = 0.33 CPU)
Result: PASS
SULLR/IO-Socket-SSL-2.012.tar.gz
C:\strawberry\c\bin\dmake.exe test -- OK
Running make install
Installing C:\strawberry\perl\site\lib\IO\Socket\SSL.pm
Installing C:\strawberry\perl\site\lib\IO\Socket\SSL.pod
Installing C:\strawberry\perl\site\lib\IO\Socket\SSL\Intercept.pm
Installing C:\strawberry\perl\site\lib\IO\Socket\SSL\PublicSuffix.pm
Installing C:\strawberry\perl\site\lib\IO\Socket\SSL\Utils.pm
Appending installation info to C:\strawberry\perl\lib/perllocal.pod
SULLR/IO-Socket-SSL-2.012.tar.gz
C:\strawberry\c\bin\dmake.exe install UNINST=1 -- OK
10 print "Hallo"
20 goto 10