This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author dstufft
Recipients Arfrever, Lukasa, alex, christian.heimes, dstufft, giampaolo.rodola, janssen, martius, pitrou, vstinner
Date 2014-10-15.12:08:35
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1413374915.8.0.0301571723828.issue22638@psf.upfronthosting.co.za>
In-reply-to
Content
The naming of SSLv23 is sort of unfortunate, that will negotiate the highest version of SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 that both the client and the server support. You can modify the list of what protocols are supported using the ssl.OP_NO_* flags. By default SSL 2.0 has been disabled in Python 2.7 (in <2.7.9 you can't even turn it back on afaik) and SSL 3.0 is already disabled by create_default_context() (but can be renabled by negating ssl.OP_NO_SSLv3).
History
Date User Action Args
2014-10-15 12:08:35dstufftsetrecipients: + dstufft, janssen, pitrou, vstinner, giampaolo.rodola, christian.heimes, Arfrever, alex, Lukasa, martius
2014-10-15 12:08:35dstufftsetmessageid: <1413374915.8.0.0301571723828.issue22638@psf.upfronthosting.co.za>
2014-10-15 12:08:35dstufftlinkissue22638 messages
2014-10-15 12:08:35dstufftcreate