This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author Ben.Darnell
Recipients Ben.Darnell
Date 2012-01-09.19:10:41
SpamBayes Score 1.792606e-10
Marked as misclassified No
Message-id <1326136242.52.0.747462245395.issue13747@psf.upfronthosting.co.za>
In-reply-to
Content
The ssl module docs claim that the default ssl_version for client-side operation is SSLv3, but it is actually SSLv23.  The exact behavior depends on the version of openssl:  starting in 1.0 the connection is limited by default to SSLv3 or TLSv1 (as documented in the note below the compatibility table), but in older versions of openssl SSLv2 is allowed by default. 

This is just a documentation error if you've got a recent version of openssl, but it's also a security problem with older versions, since people may have been unknowingly using the weaker SSLv2 protocol.  (I don't know how widespread pre-1.0 versions of openssl are these days, but OSX Lion still ships with 0.9.8)  It would be nice if the default mode were SSLv23 with SSL_OP_NO_SSLv2 set so the defaults would be safe even with older versions of openssl (there's no way to set this configuration from python code before py3.2)

Also, the compatibility table claims that an SSLv3 client can talk to an SSLv2 server, which is incorrect.  SSLv23 clients can talk to SSLv3 and TLSv1 servers if openssl is at least version 1.0 and SSLv2 ciphers are not explicitly enabled.
History
Date User Action Args
2012-01-09 19:10:42Ben.Darnellsetrecipients: + Ben.Darnell
2012-01-09 19:10:42Ben.Darnellsetmessageid: <1326136242.52.0.747462245395.issue13747@psf.upfronthosting.co.za>
2012-01-09 19:10:41Ben.Darnelllinkissue13747 messages
2012-01-09 19:10:41Ben.Darnellcreate