This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author vstinner
Recipients flox, giampaolo.rodola, janssen, pitrou, vstinner
Date 2010-04-06.08:57:33
SpamBayes Score 0.0028083583
Marked as misclassified No
Message-id <1270544256.1.0.783316136627.issue8322@psf.upfronthosting.co.za>
In-reply-to
Content
Extract of SSL_CTX_new manual page:


SSLv23_method(void), SSLv23_server_method(void), SSLv23_client_method(void)

  A TLS/SSL connection established with these methods will understand
  the SSLv2, SSLv3, and TLSv1 protocol. A client will send out SSLv2
  client hello messages and will indicate that it also understands
  SSLv3 and TLSv1. A server will understand SSLv2, SSLv3, and TLSv1
  client hello messages. This is the best choice when compatibility
  is a concern.

I don't think that "Client protocol SSLv23 succeeded with server protocol SSLv3" or "Client protocol SSLv23 succeeded with server protocol TLSv1" are errors.
History
Date User Action Args
2010-04-06 08:57:36vstinnersetrecipients: + vstinner, janssen, pitrou, giampaolo.rodola, flox
2010-04-06 08:57:36vstinnersetmessageid: <1270544256.1.0.783316136627.issue8322@psf.upfronthosting.co.za>
2010-04-06 08:57:34vstinnerlinkissue8322 messages
2010-04-06 08:57:33vstinnercreate