This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author lemburg
Recipients alex, benjamin.peterson, christian.heimes, doko, dstufft, giampaolo.rodola, janssen, kroeckx, lemburg, ned.deily, pitrou, python-dev, vstinner
Date 2014-12-12.12:47:55
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1418388475.6.0.215630692093.issue22935@psf.upfronthosting.co.za>
In-reply-to
Content
Please always use PROTOCOL_SSLv23 since this is the only forward compatible way of telling OpenSSL to use the best protocol available.

Any of the other options such as PROTOCOL_TLSv1 will fix the protocol version to that one protocol version, whereas PROTOCOL_SSLv23 means to use any protocol starting with SSLv2. In the context options you can then disable SSLv2 and SSLv3 to e.g. have the connection use TLS 1.0 or later.
History
Date User Action Args
2014-12-12 12:47:55lemburgsetrecipients: + lemburg, doko, janssen, pitrou, vstinner, giampaolo.rodola, christian.heimes, benjamin.peterson, ned.deily, alex, python-dev, dstufft, kroeckx
2014-12-12 12:47:55lemburgsetmessageid: <1418388475.6.0.215630692093.issue22935@psf.upfronthosting.co.za>
2014-12-12 12:47:55lemburglinkissue22935 messages
2014-12-12 12:47:55lemburgcreate