-
-
Notifications
You must be signed in to change notification settings - Fork 31.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reenable TLS1.1 and 1.2 while leaving SSLv3 disabled #2385
Conversation
My understanding of the Python ssl library used I'd be in favor of adding tls1.1/tls1.2 . Prior to this update the I don't see an option to allow for negotiation that also bans sslv2/3. Any On Tue, Jun 28, 2016, 16:32 AlucardZero [email protected] wrote:
|
Got it. Looks like we need to create a ssl.Context object, then set the On Tue, Jun 28, 2016, 17:14 Dan Kemp [email protected] wrote:
|
@danieljkemp this pr fixes it right? |
@danieljkemp right - this is actually a PR that does that so you don't have to |
Sorry! Issues and PRs look too similar on this device, the fix I threw On Tue, Jun 28, 2016, 17:39 AlucardZero [email protected] wrote:
|
Now that everyone is happy, I'll merge it ! 👍 🐬 🍺 |
Description:
#2375 successfully deprecated SSLv2 and v3, but also disabled TLSv1.1 and v1.2. This reenables TLSv1.1 and 1.2 while leaving SSLv2 and v3 disabled. It also prevents CRIME because it can.
Details:
eventlet.wrap_ssl is just a wrapper for ssl.wrap_socket, which is less flexible than SSLContext.wrap_socket(). So this creates an SSL context and sets the same options (cert, key, ciphers, server_side) while setting the TLS versions more forward-compatibly (ssl.PROTOCOL_SSLv23 selects the highest available version).
Checklist:
If the code does not interact with devices:
tox
run successfully. Your PR cannot be merged unless tests pass